{"id":"CVE-2017-14608","details":"In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.","modified":"2026-04-16T04:39:31.965418057Z","published":"2017-09-20T17:29:00.510Z","related":["SUSE-SU-2017:3392-1","SUSE-SU-2022:1277-1","SUSE-SU-2022:1749-1","openSUSE-SU-2024:10712-1"],"references":[{"type":"REPORT","url":"https://github.com/LibRaw/LibRaw/issues/101"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"last_affected":"8303e74b0567806dd5f16fc39aab70fe928de1a2"},{"fixed":"d13e8f6d1e987b7491182040a188c16a395f1d21"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.18.4"}]}}],"versions":["0.12.0","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0","0.18.1","0.18.2","0.18.3","0.18.4"],"database_specific":{"vanir_signatures_modified":"2026-04-11T04:14:22Z","vanir_signatures":[{"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["202157822897561779189183472516495530908","144687929659205114131421584750958499196","334708782772715860409840809220348812915","209885300085744681948805856641535568215","11230180545788369180989943269865665904"]},"deprecated":false,"id":"CVE-2017-14608-1981bad3","source":"https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21","signature_type":"Line","target":{"file":"internal/dcraw_common.cpp"}},{"signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["202157822897561779189183472516495530908","144687929659205114131421584750958499196","334708782772715860409840809220348812915","209885300085744681948805856641535568215","11230180545788369180989943269865665904"]},"deprecated":false,"target":{"file":"dcraw/dcraw.c"},"source":"https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21","signature_type":"Line","id":"CVE-2017-14608-376f19eb"},{"signature_version":"v1","digest":{"function_hash":"138374478490586344001064023637424054982","length":496},"deprecated":false,"id":"CVE-2017-14608-4c34d868","source":"https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21","signature_type":"Function","target":{"function":"kodak_65000_load_raw","file":"dcraw/dcraw.c"}},{"signature_version":"v1","digest":{"function_hash":"138374478490586344001064023637424054982","length":496},"deprecated":false,"id":"CVE-2017-14608-b1f334a2","source":"https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21","signature_type":"Function","target":{"function":"kodak_65000_load_raw","file":"internal/dcraw_common.cpp"}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14608.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}]}