UbuntuUpdates.org

Package "libraw"

Name: libraw

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • raw image decoder library (development files)
  • raw image decoder library (documentation)
  • raw image decoder library

Latest version: 0.20.2-2ubuntu2.22.04.2
Release: jammy (22.04)
Level: updates
Repository: main

Links



Other versions of "libraw" in Jammy

Repository Area Version
base main 0.20.2-2ubuntu2
base universe 0.20.2-2ubuntu2
security main 0.20.2-2ubuntu2.22.04.2
security universe 0.20.2-2ubuntu2.22.04.2
updates universe 0.20.2-2ubuntu2.22.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 0.20.2-2ubuntu2.22.04.2 2025-05-06 10:08:19 UTC

  libraw (0.20.2-2ubuntu2.22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Out of bounds read
    - debian/patches/CVE-2025-43961-CVE-2025-43962.patch: Check
      size of head array values
    - CVE-2025-43961
    - CVE-2025-43962
    - debian/patches/CVE-2025-43963.patch: check split_col/split_row
      values in phase_one_correct
    - CVE-2025-43963
  * SECURITY UPDATE: Malformed input
    - debian/patches/CVE-2025-43964.patch: additional checks in PhaseOne
      correction tag 0x412 processing
    - CVE-2025-43964

 -- Bruce Cable <email address hidden> Mon, 28 Apr 2025 14:02:47 +1000

Source diff to previous version
CVE-2025-43961 In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser.
CVE-2025-43962 In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp has out-of-bounds reads for tag 0x412 processing, related to large w0 or w1 v
CVE-2025-43963 In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp allows out-of-buffer access because split_col and split_row values are not ch
CVE-2025-43964 In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in decoders/load_mfbacks.cpp does not enforce minimum w0 and w1 values.

Version: 0.20.2-2ubuntu2.22.04.1 2023-06-05 16:07:24 UTC

  libraw (0.20.2-2ubuntu2.22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: denial of service via buffer overflow
    - debian/patches/CVE-2021-32142.patch: check for input buffer size on
      datastream::gets in src/libraw_datastream.cpp.
    - CVE-2021-32142
  * SECURITY UPDATE: heap-buffer-overflow in raw2image_ex()
    - debian/patches/CVE-2023-1729.patch: do not set shrink flag for 3/4
      component images in src/preprocessing/raw2image.cpp.
    - CVE-2023-1729

 -- Marc Deslauriers <email address hidden> Thu, 01 Jun 2023 13:03:58 -0400

CVE-2021-32142 Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int)
CVE-2023-1729 A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.



About   -   Send Feedback to @ubuntu_updates