Debian Package Tracker
Register | Log in
Subscribe

libraw

Choose email to subscribe with

general
  • source: libraw (main)
  • version: 0.22.1-1
  • maintainer: Debian PhotoTools Maintainers (archive) (DMD)
  • uploaders: Matteo F. Vescovi [DMD]
  • arch: all any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.20.2-1+deb11u1
  • o-o-sec: 0.20.2-1+deb11u2
  • oldstable: 0.20.2-2.1+deb12u1
  • stable: 0.21.4-2
  • testing: 0.22.1-1
  • unstable: 0.22.1-1
versioned links
  • 0.20.2-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.20.2-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.20.2-2.1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.21.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.21.5b-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.22.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libraw-bin
  • libraw-dev
  • libraw-doc
  • libraw25
action needed
8 security issues in trixie high

There are 8 open security issues in trixie.

7 important issues:
  • CVE-2026-5318: A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.
  • CVE-2026-20884: An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-20889: A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-20911: A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-21413: A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-24450: An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-24660: A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
1 issue left for the package maintainer to handle:
  • CVE-2026-5342: (needs triaging) A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-02 Last update: 2026-05-13 06:30
8 security issues in bullseye high

There are 8 open security issues in bullseye.

7 important issues:
  • CVE-2026-5318: A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.
  • CVE-2026-20884: An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-20889: A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-20911: A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-21413: A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-24450: An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-24660: A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
1 issue postponed or untriaged:
  • CVE-2026-5342: (postponed; to be fixed through a stable update) A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.
Created: 2026-04-02 Last update: 2026-05-13 06:30
8 security issues in bookworm high

There are 8 open security issues in bookworm.

7 important issues:
  • CVE-2026-5318: A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.
  • CVE-2026-20884: An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-20889: A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-20911: A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-21413: A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-24450: An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2026-24660: A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
1 issue left for the package maintainer to handle:
  • CVE-2026-5342: (needs triaging) A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-02 Last update: 2026-05-13 06:30
lintian reports 13 warnings normal
Lintian reports 13 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-01-04 Last update: 2026-01-20 22:33
news
[rss feed]
  • [2026-05-13] libraw 0.22.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-05-11] Accepted libraw 0.22.1-1 (source) into unstable (xiao sheng wen)
  • [2026-04-21] Accepted libraw 0.22.1-1~exp2 (source) into experimental (xiao sheng wen)
  • [2026-04-16] Accepted libraw 0.22.1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: xiao sheng wen)
  • [2026-02-07] Accepted libraw 0.22.0-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: xiao sheng wen)
  • [2026-01-06] libraw 0.21.5b-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-04] Accepted libraw 0.21.5b-1 (source) into unstable (xiao sheng wen)
  • [2025-12-31] Accepted libraw 0.21.4-3~exp2 (source) into experimental (xiao sheng wen)
  • [2025-12-30] Accepted libraw 0.21.4-3~exp1 (source) into experimental (xiao sheng wen)
  • [2025-05-31] Accepted libraw 0.20.2-2.1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-05-05] libraw 0.21.4-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-29] Accepted libraw 0.20.2-1+deb11u2 (source) into oldstable-security (Andreas Henriksson)
  • [2025-04-24] Accepted libraw 0.21.4-2 (source) into unstable (xiao sheng wen)
  • [2025-04-24] Accepted libraw 0.21.4-1 (source) into unstable (xiao sheng wen)
  • [2024-10-27] libraw 0.21.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-24] Accepted libraw 0.21.3-1 (source) into unstable (Matteo F. Vescovi)
  • [2024-04-24] libraw 0.21.2-2.1 MIGRATED to testing (Debian testing watch)
  • [2024-02-28] Accepted libraw 0.21.2-2.1 (source) into unstable (Benjamin Drung)
  • [2024-02-02] Accepted libraw 0.21.2-2.1~exp1 (source) into experimental (Steve Langasek)
  • [2024-01-19] libraw 0.21.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-01-17] Accepted libraw 0.21.2-2 (source) into unstable (Gianfranco Costamagna)
  • [2024-01-17] libraw 0.21.2-1 MIGRATED to testing (Debian testing watch)
  • [2024-01-14] Accepted libraw 0.21.2-1 (source) into unstable (Matteo F. Vescovi)
  • [2023-09-10] Accepted libraw 0.19.2-2+deb10u4 (source) into oldoldstable (Guilhem Moulin)
  • [2023-07-26] libraw 0.21.1-7 MIGRATED to testing (Debian testing watch)
  • [2023-07-24] Accepted libraw 0.21.1-7 (source) into unstable (Matteo F. Vescovi)
  • [2023-07-22] Accepted libraw 0.21.1-6 (source) into unstable (Matteo F. Vescovi)
  • [2023-07-18] Accepted libraw 0.21.1-5 (source) into unstable (Matteo F. Vescovi)
  • [2023-07-17] libraw 0.21.1-4 MIGRATED to testing (Debian testing watch)
  • [2023-07-02] Accepted libraw 0.21.1-4 (source) into unstable (Matteo F. Vescovi)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 13)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.21.5b-1ubuntu1
  • 1 bug
  • patches for 0.21.5b-1ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing