Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8a37ecf0-9de9-40a2-9e3a-0d1d7cacc5e8@oracle.com>
Date: Sat, 11 Apr 2026 09:42:42 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: LibRaw 0.22.1 Release with security fixes

https://www.libraw.org/news/libraw-0-22-1-release announces:
> LibRaw 0.22.1 Release is just published in our Github repository
> <https://github.com/LibRaw/LibRaw> and this site download section
> <https://www.libraw.org/download>.
> 
> This is bugfix-only release with these commits included:
> 
>  * Limit strcat space in hassy model manipulation
>  * Version increment; shlib increment: internal ABI has changed
>  * check panasonic enc8 tile width against image width
>  * CR3 parser: zero all buffers before fread
>  * skip memory allocation checks for OWN_ALLOC decoders
>  * DNG SDK glue: check for memory limits
>  * raw2image()/dcraw_process() - check for int16 source data present
>  * Check for correct bayer pattern, pass incorect ones to vng_interpolate
>  * parse_rollei: zero input string before fgets
>  * Nikon padded/12bit: no need to calculate padded row size before final
>    raw_width adjustment
>  * TALOS-2026-2364: Fix for data size calculation integer overflow in
>    float/deflated DNG loader; Check for read results
>  * Fix for TALOS-2026-2363: avoid integer overflow in allocation size
>    calculation. Also: check for EOF in read loop
>  * X3F decoder: implemented hard single allocation limit via
>    LIBRAW_X3F_ALLOC_LIMIT_MB define;
>  * allocation size calculation converted to 64 bit arithm; fix for
>    TALOS-2026-2359
>  * Fix for TALOS-2026-2358
>  * Fix for TALOS-2026-2331
>  * Fix for TALOS-2026-2330
>  * Sony YCC decoder: check tile size; add +3 bytes to input buffer to avoid
>    possible overrun in huffman decoder
>  * FP DNG data limit: perform calculations in 64 bit
>  * Add extra huff_coeff item to handle huff_index==17 with known (zero) value,
>    not externally provided tag value
>  * use %lld format for timestamp parse/print where appropriate
>  * nikon coolscan loader: check for EOF
>  * Initialize olympus lensID bits
>  * CR3 parser: all file offsets are unsigned/64bit; check current offset
>    against file size
>  * Add Canon EOS Kiss M2 to camera list
>  * Check real color count against filters; do not pass really 4-color images
>    to fbdd or advanced demosaic
>  * Use LIBRAW_EXCEPTION instead of own internal in losslessjpeg.h
>  * zero input string to avoid compare random stack garbage with tag names
>  * Check for eof in Pentax tag search loop
>  * Fuji decoder: initialize allocated buffers

Further information about the vulnerabilities reported by Cisco Talos can be
found in their reports:

- TALOS-2026-2330 / CVE-2026-20911
   LibRaw HuffTable::initval heap-based buffer overflow vulnerability
   https://talosintelligence.com/vulnerability_reports/TALOS-2026-2330

   A heap-based buffer overflow vulnerability exists in the HuffTable::initval
   functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially
   crafted malicious file can lead to a heap buffer overflow. An attacker
   can provide a malicious file to trigger this vulnerability.

- TALOS-2026-2331 / CVE-2026-21413
   LibRaw lossless_jpeg_load_raw heap-based buffer overflow vulnerability
   https://talosintelligence.com/vulnerability_reports/TALOS-2026-2331

   A heap-based buffer overflow vulnerability exists in the
   lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and
   Commit d20315b. A specially crafted malicious file can lead to a heap buffer
   overflow. An attacker can provide a malicious file to trigger this
   vulnerability.

- TALOS-2026-2358 / CVE-2026-20889
   LibRaw x3f_thumb_loader heap-based buffer overflow vulnerability
   https://talosintelligence.com/vulnerability_reports/TALOS-2026-2358

   A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader
   functionality of LibRaw Commit d20315b. A specially crafted malicious file
   can lead to a heap buffer overflow. An attacker can provide a malicious file
   to trigger this vulnerability.

- TALOS-2026-2359 / CVE-2026-24660
   LibRaw x3f_load_huffman heap-based buffer overflow vulnerability
   https://talosintelligence.com/vulnerability_reports/TALOS-2026-2359

   A heap-based buffer overflow vulnerability exists in the x3f_load_huffman
   functionality of LibRaw Commit d20315b. A specially crafted malicious file
   can lead to a heap buffer overflow. An attacker can provide a malicious file
   to trigger this vulnerability.

- TALOS-2026-2363 / CVE-2026-24450
   LibRaw uncompressed_fp_dng_load_raw integer overflow vulnerability
   https://talosintelligence.com/vulnerability_reports/TALOS-2026-2363

   An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw
   functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file
   can lead to a heap buffer overflow. An attacker can provide a malicious file
   to trigger this vulnerability.

- TALOS-2026-2364 / CVE-2026-20884
   LibRaw deflate_dng_load_raw integer overflow vulnerability
   https://talosintelligence.com/vulnerability_reports/TALOS-2026-2364

   An integer overflow vulnerability exists in the deflate_dng_load_raw
   functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file
   can lead to a heap buffer overflow. An attacker can provide a malicious file
   to trigger this vulnerability.

Additional CVEs also appear to have been issued for some of the fixes:

- CVE-2026-5318 appears to be a duplicate for independent reporting of the
   TALOS-2026-2330 / CVE-2026-20911 issue in
   https://github.com/LibRaw/LibRaw/issues/794

- CVE-2026-5342 for the fix listed above as "Nikon padded/12bit: no need to
   calculate padded row size before final raw_width adjustment" and originally
   reported in https://github.com/LibRaw/LibRaw/issues/795

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.