Package "libraw"
Name: |
libraw
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- raw image decoder library (development files)
- raw image decoder library (documentation)
- raw image decoder library
|
Latest version: |
0.19.5-1ubuntu1.4 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Links
Other versions of "libraw" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
libraw (0.19.5-1ubuntu1.4) focal-security; urgency=medium
* SECURITY UPDATE: Out of bounds read
- debian/patches/CVE-2025-43961-CVE-2025-43962.patch: Check
size of head array values
- CVE-2025-43961
- CVE-2025-43962
- debian/patches/CVE-2025-43963.patch: check split_col/split_row
values in phase_one_correct
- CVE-2025-43963
* SECURITY UPDATE: Malformed input
- debian/patches/CVE-2025-43964.patch: additional checks in PhaseOne
correction tag 0x412 processing
- CVE-2025-43964
-- Bruce Cable <email address hidden> Mon, 28 Apr 2025 14:08:42 +1000
|
Source diff to previous version |
CVE-2025-43961 |
In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser. |
CVE-2025-43962 |
In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp has out-of-bounds reads for tag 0x412 processing, related to large w0 or w1 v |
CVE-2025-43963 |
In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp allows out-of-buffer access because split_col and split_row values are not ch |
CVE-2025-43964 |
In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in decoders/load_mfbacks.cpp does not enforce minimum w0 and w1 values. |
|
libraw (0.19.5-1ubuntu1.3) focal-security; urgency=medium
* SECURITY UPDATE: DoS via out-of-bounds read
- debian/patches/CVE-2020-22628.patch: early reject images w/ broken
pixel aspect ratio in dcraw/dcraw.c, internal/dcraw_common.cpp.
- CVE-2020-22628
-- Marc Deslauriers <email address hidden> Thu, 14 Sep 2023 13:09:14 -0400
|
Source diff to previous version |
CVE-2020-22628 |
Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. |
|
libraw (0.19.5-1ubuntu1.2) focal-security; urgency=medium
* SECURITY UPDATE: denial of service via buffer overflow
- debian/patches/CVE-2021-32142.patch: check for input buffer size on
datastream::gets in src/libraw_datastream.cpp.
- CVE-2021-32142
* SECURITY UPDATE: heap-buffer-overflow in raw2image_ex()
- debian/patches/CVE-2023-1729.patch: do not set shrink flag for 3/4
component images in src/libraw_cxx.cpp.
- CVE-2023-1729
-- Marc Deslauriers <email address hidden> Thu, 01 Jun 2023 13:13:14 -0400
|
Source diff to previous version |
CVE-2021-32142 |
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) |
CVE-2023-1729 |
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash. |
|
libraw (0.19.5-1ubuntu1.1) focal-security; urgency=medium
* SECURITY UPDATE: missing thumbnail size range checks
- debian/patches/CVE-2020-15503.patch: add checks to
libraw/libraw_const.h, src/libraw_cxx.cpp.
- CVE-2020-15503
* SECURITY UPDATE: out-of-bounds write via X3F file
- debian/patches/CVE-2020-35530.patch: check huffman tree size in
internal/libraw_x3f.cpp.
- CVE-2020-35530
* SECURITY UPDATE: out-of-bounds read in get_huffman_diff()
- debian/patches/CVE-2020-35531.patch: check for data offset limit in
internal/libraw_x3f.cpp.
- CVE-2020-35531
* SECURITY UPDATE: out-of-bounds read via a large row_stride field
- debian/patches/CVE-2020-35532.patch: check for data offset limit in
internal/libraw_x3f.cpp.
- CVE-2020-35532
* SECURITY UPDATE: out-of-bounds read in adobe_copy_pixel()
- debian/patches/CVE-2020-35533.patch: more room for ljpeg row in
dcraw/dcraw.c.
- CVE-2020-35533
-- Marc Deslauriers <email address hidden> Fri, 04 Nov 2022 13:37:22 -0400
|
CVE-2020-15503 |
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_util |
CVE-2020-35530 |
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggere |
CVE-2020-35531 |
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data |
CVE-2020-35532 |
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be t |
CVE-2020-35533 |
In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading dat |
|
About
-
Send Feedback to @ubuntu_updates