Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
https://security.gentoo.org/glsa/201706-17
https://security.gentoo.org/glsa/201701-54
https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e
https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5
http://www.securityfocus.com/bid/74590
http://www.securityfocus.com/archive/1/535513/100/0/threaded
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.ocert.org/advisories/ocert-2015-006.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html