Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-5342

Опубликовано: 02 апр. 2026
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.

A flaw was found in LibRaw. A remote attacker could exploit this vulnerability by manipulating the load_flags or raw_width arguments within the LibRaw::nikon_load_padded_packed_raw function. This manipulation can lead to an out-of-bounds read, potentially causing application instability or a denial of service.

Отчет

Moderate impact. A flaw in LibRaw allows a remote attacker to trigger an out-of-bounds read by manipulating load_flags or raw_width arguments when processing specially crafted raw image files. This can lead to application instability or a denial of service. Red Hat products utilizing LibRaw to process untrusted raw image files are affected.

Меры по смягчению последствий

To mitigate this issue, avoid processing untrusted or maliciously crafted Nikon raw image files with applications that use LibRaw. This operational control prevents the exploitation of the out-of-bounds read vulnerability by limiting exposure to potentially harmful input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libraw1394Out of support scope
Red Hat Enterprise Linux 7LibRawFix deferred
Red Hat Enterprise Linux 7libraw1394Fix deferred
Red Hat Enterprise Linux 8LibRawFix deferred
Red Hat Enterprise Linux 8libraw1394Fix deferred
Red Hat Enterprise Linux 9LibRawFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2454372LibRaw: LibRaw: Out-of-bounds read via `load_flags/raw_width` argument manipulation

EPSS

Процентиль: 14%
0.00045
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
5 дней назад

(A flaw has been found in LibRaw up to 0.22.0. This affects the functio ...)

CVSS3: 5.3
nvd
5 дней назад

A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.

CVSS3: 5.3
debian
5 дней назад

A flaw has been found in LibRaw up to 0.22.0. This affects the functio ...

CVSS3: 5.3
github
5 дней назад

A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.

EPSS

Процентиль: 14%
0.00045
Низкий

5.3 Medium

CVSS3