Source: libraw
Version: 0.21.4-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for libraw.

CVE-2026-5318[0]:
| A weakness has been identified in LibRaw up to 0.22.0. This impacts
| the function HuffTable::initval of the file
| src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser.
| This manipulation of the argument bits[] causes out-of-bounds write.
| It is possible to initiate the attack remotely. The exploit has been
| made available to the public and could be used for attacks.
| Upgrading to version 0.22.1 will fix this issue. Patch name:
| a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade
| the affected component.


CVE-2026-5342[1]:
| A flaw has been found in LibRaw up to 0.22.0. This affects the
| function LibRaw::nikon_load_padded_packed_raw of the file
| src/decoders/decoders_libraw.cpp of the component TIFF/NEF.
| Executing a manipulation of the argument load_flags/raw_width can
| lead to out-of-bounds read. It is possible to launch the attack
| remotely. The exploit has been published and may be used. Upgrading
| to version 0.22.1 mitigates this issue. This patch is called
| b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade
| the affected component.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-5318
    https://www.cve.org/CVERecord?id=CVE-2026-5318
    https://github.com/LibRaw/LibRaw/issues/794
[1] https://security-tracker.debian.org/tracker/CVE-2026-5342
    https://www.cve.org/CVERecord?id=CVE-2026-5342
    https://github.com/LibRaw/LibRaw/issues/795

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to