A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution. References: https://github.com/LibRaw/LibRaw/issues/334
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1882342] Affects: fedora-all [bug 1882341]
Created mingw-LibRaw tracking bugs for this issue: Affects: fedora-all [bug 1882343]
Correction: affected version should say = 0.20.0. The vulnerable code was first introduced to LibRaw in 0.20.0. See: 1. https://www.libraw.org/news/libraw-0-20-Release 2. https://github.com/LibRaw/LibRaw/commit/d1975cb0e055d2bfe58c9d845c9a3e57c346a2f9#diff-7ba01eaad8f8766e799b7d3b1fba5640
Statement: This flaw does not affect LibRaw as shipped with Red Hat Enterprise Linux 7 or 8 as the vulnerable code was introduced in a subsequent version of LibRaw.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-24889