{"id":"CVE-2020-35532","details":"In LibRaw, an out-of-bounds read vulnerability exists within the \"simple_decode_row()\" function (libraw\\src\\x3f\\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.","modified":"2026-04-11T16:25:39.478502Z","published":"2022-09-01T18:15:08.870Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/issues/271"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"last_affected":"2aee1220d5ecdcb8887b11c3d505a900570852c6"},{"introduced":"0"},{"last_affected":"95d5f1616d7df552fba853ea91ff1d6fc00feb6c"},{"introduced":"0"},{"last_affected":"0209b6a2caec189e6d1a9b21c10e9e49f46e5a92"},{"fixed":"5ab45b085898e379fedc6b113e2e82a890602b1e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.20.0-NA"},{"introduced":"0"},{"last_affected":"0.20.1"},{"introduced":"0"},{"last_affected":"0.20.2"}]}}],"versions":["0.12.0","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0","0.20-RC2","0.20.0","0.20.1","0.20.2"],"database_specific":{"vanir_signatures_modified":"2026-04-11T16:25:39Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"0.20.0-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"0.21.0-beta1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"vanir_signatures":[{"deprecated":false,"signature_version":"v1","id":"CVE-2020-35532-05a6540b","target":{"file":"src/x3f/x3f_utils_patched.cpp","function":"simple_decode_row"},"signature_type":"Function","digest":{"function_hash":"213568343310910898600674811266997841845","length":1264},"source":"https://github.com/libraw/libraw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e"},{"deprecated":false,"signature_version":"v1","id":"CVE-2020-35532-4486dc52","target":{"file":"src/x3f/x3f_utils_patched.cpp"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["328840561769977566781867518991491042441","310875237608132038042484182185969086601","261945196420340983425097196176001449722"]},"source":"https://github.com/libraw/libraw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35532.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}