UbuntuUpdates.org

Package "libraw"

Name: libraw

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • raw image decoder library (tools)

Latest version: 0.19.5-1ubuntu1.3
Release: focal (20.04)
Level: security
Repository: universe

Links



Other versions of "libraw" in Focal

Repository Area Version
base universe 0.19.5-1ubuntu1
base main 0.19.5-1ubuntu1
security main 0.19.5-1ubuntu1.3
updates main 0.19.5-1ubuntu1.3
updates universe 0.19.5-1ubuntu1.3

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 0.19.5-1ubuntu1.3 2023-09-18 15:08:16 UTC

  libraw (0.19.5-1ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: DoS via out-of-bounds read
    - debian/patches/CVE-2020-22628.patch: early reject images w/ broken
      pixel aspect ratio in dcraw/dcraw.c, internal/dcraw_common.cpp.
    - CVE-2020-22628

 -- Marc Deslauriers <email address hidden> Thu, 14 Sep 2023 13:09:14 -0400

Source diff to previous version
CVE-2020-22628 Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp.

Version: 0.19.5-1ubuntu1.2 2023-06-05 16:07:20 UTC

  libraw (0.19.5-1ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: denial of service via buffer overflow
    - debian/patches/CVE-2021-32142.patch: check for input buffer size on
      datastream::gets in src/libraw_datastream.cpp.
    - CVE-2021-32142
  * SECURITY UPDATE: heap-buffer-overflow in raw2image_ex()
    - debian/patches/CVE-2023-1729.patch: do not set shrink flag for 3/4
      component images in src/libraw_cxx.cpp.
    - CVE-2023-1729

 -- Marc Deslauriers <email address hidden> Thu, 01 Jun 2023 13:13:14 -0400

Source diff to previous version
CVE-2021-32142 Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int)
CVE-2023-1729 A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.

Version: 0.19.5-1ubuntu1.1 2022-11-07 18:06:31 UTC

  libraw (0.19.5-1ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: missing thumbnail size range checks
    - debian/patches/CVE-2020-15503.patch: add checks to
      libraw/libraw_const.h, src/libraw_cxx.cpp.
    - CVE-2020-15503
  * SECURITY UPDATE: out-of-bounds write via X3F file
    - debian/patches/CVE-2020-35530.patch: check huffman tree size in
      internal/libraw_x3f.cpp.
    - CVE-2020-35530
  * SECURITY UPDATE: out-of-bounds read in get_huffman_diff()
    - debian/patches/CVE-2020-35531.patch: check for data offset limit in
      internal/libraw_x3f.cpp.
    - CVE-2020-35531
  * SECURITY UPDATE: out-of-bounds read via a large row_stride field
    - debian/patches/CVE-2020-35532.patch: check for data offset limit in
      internal/libraw_x3f.cpp.
    - CVE-2020-35532
  * SECURITY UPDATE: out-of-bounds read in adobe_copy_pixel()
    - debian/patches/CVE-2020-35533.patch: more room for ljpeg row in
      dcraw/dcraw.c.
    - CVE-2020-35533

 -- Marc Deslauriers <email address hidden> Fri, 04 Nov 2022 13:37:22 -0400

CVE-2020-15503 LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_util
CVE-2020-35530 In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggere
CVE-2020-35531 In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data
CVE-2020-35532 In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be t
CVE-2020-35533 In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading dat



About   -   Send Feedback to @ubuntu_updates