CVE-2020-22628Classic Buffer Overflow in Libraw

Severity
6.5MEDIUMNVD
OSV5.5
EPSS
0.1%
top 74.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 22
Latest updateFeb 13

Description

Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/libraw< libraw 0.20.0-4 (bookworm)
Debianlibraw/libraw< 0.20.0-4+3
NVDlibraw/libraw0.19.5

Patches

🔴Vulnerability Details

3
OSV
digikam vulnerabilities2025-02-13
OSV
CVE-2020-22628: Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio2023-08-22
GHSA
GHSA-c4mp-wp8f-qrg6: Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio2023-08-22

📋Vendor Advisories

4
Ubuntu
digiKam vulnerabilities2025-02-13
Ubuntu
LibRaw vulnerability2023-09-18
Red Hat
libraw: Out of bounds read in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp2023-08-22
Debian
CVE-2020-22628: libraw - Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postpr...2020