Description
An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Published: 2026-04-07
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution
Action: Apply patch
AI Analysis

Impact

An integer overflow in the deflate_dng_load_raw function of LibRaw allows a malicious DNG file to corrupt a heap buffer, which can be leveraged for arbitrary code execution. The flaw is classified as CWE‑190, Integer Overflow or Wraparound, and leads to a heap buffer overflow that compromises confidentiality, integrity, and availability of the host process.

Affected Systems

LibRaw version 0.22.1 is affected. Applications that link against this release, such as image editors or viewers that process DNG files, are at risk. The vulnerability is limited to this exact version; newer releases are unaffected.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity vulnerability. EPSS is under 1 %, so the likelihood of exploitation is currently low, and the flaw is not documented in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires feeding a specially crafted DNG file to a program that invokes LibRaw; depending on the target, this can happen via local file upload, remote file transfer, or automatic download, making the attack vector potentially remote if the application accepts untrusted files over a network.

Generated by OpenCVE AI on April 10, 2026 at 23:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LibRaw to the latest release (≥ 0.22.2 or newer) and rebuild any applications that link against the library.
  • Verify that your build pulls the patched commit (after 8dc68e2) and update dependency references accordingly.
  • If an upgrade cannot be applied immediately, restrict or quarantine the processing of untrusted DNG files and validate file integrity before they are handed to LibRaw.

Generated by OpenCVE AI on April 10, 2026 at 23:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:libraw:libraw:0.22.1:*:*:*:*:*:*:*

Thu, 09 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow via Malicious DNG File in LibRaw LibRaw: LibRaw: Arbitrary code execution via integer overflow in deflate_dng_load_raw
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow via Malicious DNG File in LibRaw
First Time appeared Libraw
Libraw libraw
Vendors & Products Libraw
Libraw libraw

Tue, 07 Apr 2026 18:00:00 +0000


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-04-13T13:04:17.769Z

Reserved: 2026-01-29T14:17:38.877Z

Link: CVE-2026-20884

cve-icon Vulnrichment

Updated: 2026-04-07T16:23:20.112Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:35.127

Modified: 2026-04-10T20:50:52.523

Link: CVE-2026-20884

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-07T13:49:22Z

Links: CVE-2026-20884 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:15Z

Weaknesses