CVE-2026-5342Improper Restriction of Operations within the Bounds of a Memory Buffer in Libraw

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 76.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 3

Description

A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages1 packages

debiandebian/libraw

🔴Vulnerability Details

3
OSV
CVE-2026-5342: (A flaw has been found in LibRaw up to 02026-04-03
GHSA
GHSA-jp35-q64r-j6gf: A flaw has been found in LibRaw up to 02026-04-02
OSV
CVE-2026-5342: A flaw has been found in LibRaw up to 02026-04-02

📋Vendor Advisories

2
Red Hat
LibRaw: LibRaw: Out-of-bounds read via `load_flags/raw_width` argument manipulation2026-04-02
Debian
CVE-2026-5342: libraw - A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-5342 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

2
Bugzilla
CVE-2026-5342 mingw-LibRaw: LibRaw: Out-of-bounds read via `load_flags/raw_width` argument manipulation [fedora-all]2026-04-02
Bugzilla
CVE-2026-5342 LibRaw: LibRaw: Out-of-bounds read via `load_flags/raw_width` argument manipulation [fedora-all]2026-04-02