Security update for libraw
| Announcement ID: | SUSE-SU-2026:1555-1 |
|---|---|
| Release Date: | 2026-04-22T16:23:21Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
This update for libraw fixes the following issues:
- CVE-2026-5342: out-of-bounds read via
LibRaw::nikon_load_padded_packed_raw(bsc#1261499). - CVE-2026-20884: integer overflow and heap buffer overflow via
deflate_dng_load_raw(bsc#1261671). - CVE-2026-20889: heap-based buffer overflow in
x3f_thumb_loader(bsc#1261672). - CVE-2026-20911: heap-based buffer overflow in
HuffTable::initval(bsc#1261673). - CVE-2026-21413: heap-based buffer overflow in
lossless_jpeg_load_raw(bsc#1261674). - CVE-2026-24450: integer overflow and heap buffer overflow via
uncompressed_fp_dng_load_raw(bsc#1261675). - CVE-2026-24660: heap-based buffer overflow in
x3f_load_huffman(bsc#1261676).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch SUSE-2026-1555=1 -
Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-1555=1 -
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1555=1 -
SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1555=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1555=1 -
SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1555=1
Package List:
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
- libraw-debugsource-0.21.1-150600.3.10.1
- libraw-tools-0.21.1-150600.3.10.1
- libraw-devel-0.21.1-150600.3.10.1
- libraw23-0.21.1-150600.3.10.1
- libraw23-debuginfo-0.21.1-150600.3.10.1
- libraw-tools-debuginfo-0.21.1-150600.3.10.1
- libraw-devel-static-0.21.1-150600.3.10.1
-
openSUSE Leap 15.6 (x86_64)
- libraw23-32bit-0.21.1-150600.3.10.1
- libraw23-32bit-debuginfo-0.21.1-150600.3.10.1
-
openSUSE Leap 15.6 (aarch64_ilp32)
- libraw23-64bit-0.21.1-150600.3.10.1
- libraw23-64bit-debuginfo-0.21.1-150600.3.10.1
-
Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- libraw-debugsource-0.21.1-150600.3.10.1
- libraw23-debuginfo-0.21.1-150600.3.10.1
- libraw23-0.21.1-150600.3.10.1
-
SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
- libraw-debugsource-0.21.1-150600.3.10.1
- libraw-tools-0.21.1-150600.3.10.1
- libraw-devel-0.21.1-150600.3.10.1
- libraw-tools-debuginfo-0.21.1-150600.3.10.1
- libraw-devel-static-0.21.1-150600.3.10.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
- libraw-debugsource-0.21.1-150600.3.10.1
- libraw23-debuginfo-0.21.1-150600.3.10.1
- libraw23-0.21.1-150600.3.10.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
- libraw-debugsource-0.21.1-150600.3.10.1
- libraw23-debuginfo-0.21.1-150600.3.10.1
- libraw23-0.21.1-150600.3.10.1
-
SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
- libraw-debugsource-0.21.1-150600.3.10.1
- libraw-devel-0.21.1-150600.3.10.1
References:
- https://www.suse.com/security/cve/CVE-2026-20884.html
- https://www.suse.com/security/cve/CVE-2026-20889.html
- https://www.suse.com/security/cve/CVE-2026-20911.html
- https://www.suse.com/security/cve/CVE-2026-21413.html
- https://www.suse.com/security/cve/CVE-2026-24450.html
- https://www.suse.com/security/cve/CVE-2026-24660.html
- https://www.suse.com/security/cve/CVE-2026-5342.html
- https://bugzilla.suse.com/show_bug.cgi?id=1261499
- https://bugzilla.suse.com/show_bug.cgi?id=1261671
- https://bugzilla.suse.com/show_bug.cgi?id=1261672
- https://bugzilla.suse.com/show_bug.cgi?id=1261673
- https://bugzilla.suse.com/show_bug.cgi?id=1261674
- https://bugzilla.suse.com/show_bug.cgi?id=1261675
- https://bugzilla.suse.com/show_bug.cgi?id=1261676