Package "libraw-dev"
Name: |
libraw-dev
|
Description: |
raw image decoder library (development files)
|
Latest version: |
0.17.1-1ubuntu0.5 |
Release: |
xenial (16.04) |
Level: |
security |
Repository: |
main |
Head package: |
libraw |
Homepage: |
http://www.libraw.org/ |
Links
Download "libraw-dev"
Other versions of "libraw-dev" in Xenial
Changelog
libraw (0.17.1-1ubuntu0.5) xenial-security; urgency=medium
* SECURITY UPDATE: infinite loop issues
- debian/patches/CVE-2018-581x.patch: add more checks to dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2018-5817
- CVE-2018-5818
- CVE-2018-5819
* SECURITY UPDATE: NULL deref in LibRaw::raw2image
- debian/patches/CVE-2018-20363.patch: add check in src/libraw_cxx.cpp.
- CVE-2018-20363
* SECURITY UPDATE: NULL deref in LibRaw::copy_bayer
- debian/patches/CVE-2018-20364.patch: add check in src/libraw_cxx.cpp.
- CVE-2018-20364
* SECURITY UPDATE: heap overflow in LibRaw::raw2image()
- debian/patches/CVE-2018-20365.patch: zero filters in dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2018-20365
-- Marc Deslauriers <email address hidden> Fri, 17 May 2019 14:00:06 -0400
|
Source diff to previous version |
CVE-2018-5817 |
A type confusion error within the "unpacked_load_raw()" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited |
CVE-2018-5818 |
An error within the "parse_rollei()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to trigger an infin |
CVE-2018-5819 |
An error within the "parse_sinar_ia()" function (internal/dcraw_common.cpp) within LibRaw versions prior to 0.19.1 can be exploited to exhaust availa |
CVE-2018-20363 |
LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference. |
CVE-2018-20364 |
LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference. |
CVE-2018-20365 |
LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow. |
|
libraw (0.17.1-1ubuntu0.4) xenial-security; urgency=medium
* SECURITY UPDATE: Multiple memory management issues
- debian/patches/CVE-2018-5807_5810_5811_5812.patch: out-of-bounds
reads, heap-based buffer overflow and NULL pointer dereference in
internal/dcraw_common.cpp
- CVE-2018-5807
- CVE-2018-5810
- CVE-2018-5811
- CVE-2018-5812
* SECURITY UPDATE: Infinite loop
- debian/patches/CVE-2018-5813.patch: infinite loop in dcraw/dcraw.c
and internal/dcraw_common.cpp
- CVE-2018-5813
* SECURITY UPDATE: Integer overflow
- debian/patches/CVE-2018-5815.patch: integer overflow in
internal/dcraw_common.cpp
- CVE-2018-5815
* SECURITY UPDATE: Divide by zero
- debian/patches/CVE-2018-5816.patch: divide by zero in
internal/dcraw_common.cpp
- CVE-2018-5816
-- Alex Murray <email address hidden> Tue, 04 Dec 2018 16:09:49 +1030
|
Source diff to previous version |
CVE-2018-5807 |
out-of-bounds read in samsung_load_raw internal/dcraw_common.cpp |
CVE-2018-5810 |
heap-based buffer overflow in rollei_load_raw internal/dcraw_common.cpp |
CVE-2018-5811 |
out-of-bounds read in nikon_coolscan_load_raw internal/dcraw_common.cpp |
CVE-2018-5812 |
NULL pointer dereference in nikon_coolscan_load_raw internal/dcraw_common.cpp |
CVE-2018-5813 |
infinite loop in the parse_minolta function in dcraw/dcraw.c |
CVE-2018-5815 |
Integer overflow in internal/dcraw_common.cpp:parse_qt() allows for denial of service |
CVE-2018-5816 |
Integer overflow in internal/dcraw_common.cpp:identify() allows for denial of service |
|
libraw (0.17.1-1ubuntu0.3) xenial-security; urgency=medium
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2018-10528.patch: parser possible
buffer overrun in src/libraw_cxx.cpp.
- CVE-2018-10528
* SECURITY UPDATE: Out-of-bounds read
- debian/patches/CVE-2018-10529.patch: X3F property table list fix
in src/libraw_cxx.cpp, internal/libraw_x3f.cpp.
- CVE-2018-10529
-- <email address hidden> (Leonidas S. Barbosa) Mon, 07 May 2018 11:35:20 -0300
|
Source diff to previous version |
CVE-2018-10528 |
An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp. |
CVE-2018-10529 |
An issue was discovered in LibRaw 0.18.9. There is an out-of-bounds read affecting the X3F property table list implementation in libraw_x3f.cpp and l |
|
libraw (0.17.1-1ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: buffer overflow in panasonic_load_raw
- debian/patches/CVE-2017-16909.patch: add more bounds checking to
dcraw/dcraw.c, internal/dcraw_common.cpp, libraw/libraw_const.h.
- CVE-2017-16909
* SECURITY UPDATE: invalid read in xtrans_interpolate
- debian/patches/CVE-2017-16910.patch: add checks and proper
initialization to dcraw/dcraw.c, internal/dcraw_common.cpp.
- CVE-2017-16910
* SECURITY UPDATE: multiple security issues
- debian/patches/CVE-2018-580x.patch: add checks to dcraw/dcraw.c,
internal/dcraw_common.cpp, src/libraw_cxx.cpp.
- CVE-2018-5800
- CVE-2018-5801
- CVE-2018-5802
* SECURITY UPDATE: image size and alloc issues
- debian/patches/security_0.18.8_1.patch: add more checks to
dcraw/dcraw.c, internal/dcraw_common.cpp, libraw/libraw_const.h,
src/libraw_cxx.cpp.
- No CVE number
* SECURITY UPDATE: Secunia #81000 security issues
- debian/patches/security_0.18.8_2.patch: add more checks to
dcraw/dcraw.c, internal/dcraw_common.cpp.
- No CVE number
-- Marc Deslauriers <email address hidden> Fri, 30 Mar 2018 09:24:02 -0400
|
Source diff to previous version |
CVE-2018-5800 |
Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function in internal/dcraw_common.cpp |
CVE-2018-5801 |
NULL pointer dereference in LibRaw::unpack function src/libraw_cxx.cpp |
CVE-2018-5802 |
Out-of-bounds read in kodak_radc_load_raw function internal/dcraw_common.cpp |
|
libraw (0.17.1-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: memory corruption in parse_tiff_ifd
- debian/patches/CVE-2017-688x.patch: add checks to dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2017-6886
- CVE-2017-6887
* SECURITY UPDATE: floating point exception in kodak_radc_load_raw
- debian/patches/CVE-2017-13735.patch: add checks to dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2017-13735
* SECURITY UPDATE: buffer overflow in xtrans_interpolate
- debian/patches/CVE-2017-14265.patch: add checks to dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2017-14265
* SECURITY UPDATE: buffer overflow in processCanonCameraInfo
- debian/patches/CVE-2017-14348.patch: add checks to dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2017-14348
* SECURITY UPDATE: out of bounds read in kodak_65000_load_raw
- debian/patches/CVE-2017-14608.patch: add checks to dcraw/dcraw.c,
internal/dcraw_common.cpp.
- CVE-2017-14608
-- Marc Deslauriers <email address hidden> Thu, 16 Nov 2017 14:02:11 -0500
|
CVE-2017-6886 |
An error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to corrupt memory. |
CVE-2017-6887 |
A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memo |
CVE-2017-13735 |
There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of serv |
CVE-2017-14265 |
A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote deni |
CVE-2017-14348 |
LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file. |
CVE-2017-14608 |
In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp |
|
About
-
Send Feedback to @ubuntu_updates