RHSA-2026:11360
Vulnerability from csaf_redhat - Published: 2026-04-28 13:55 - Updated: 2026-05-05 06:50Summary
Red Hat Security Advisory: LibRaw security update
Severity
Important
Notes
Topic: An update for LibRaw is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).
Security Fix(es):
* LibRaw: LibRaw: Arbitrary code execution via a specially crafted malicious file (CVE-2026-24450)
* LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading (CVE-2026-21413)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
A flaw was found in LibRaw. A heap-based buffer overflow vulnerability exists in the `lossless_jpeg_load_raw` functionality. A remote attacker can exploit this by providing a specially crafted malicious file. This can lead to arbitrary code execution, allowing the attacker to take control of the affected system, or cause a denial of service (DoS).
7.5 (High)
Vendor Fix
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
https://access.redhat.com/errata/RHSA-2026:11360
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
A flaw was found in LibRaw. A remote attacker could exploit an integer overflow vulnerability by providing a specially crafted malicious file. This flaw, located in the `uncompressed_fp_dng_load_raw` functionality, leads to a heap buffer overflow. Successful exploitation may result in arbitrary code execution or a denial of service.
7.5 (High)
Vendor Fix
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
https://access.redhat.com/errata/RHSA-2026:11360
Workaround
This vulnerability can be mitigated by limiting the amount of memory used to unpack untrusted RAW images. This needs to be set in the application using the LibRaw and can be achieved by setting the `max_raw_memory_mb` to a value smaller than 16GB.
This parameter can't be changed in runtime in the library, so developers needs to patch and rebuild their application to impose the new limit. It's important to notice the fact when reducing the memory limit for the decoding process may render the library unable to handle big images.
References
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for LibRaw is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).\n\nSecurity Fix(es):\n\n* LibRaw: LibRaw: Arbitrary code execution via a specially crafted malicious file (CVE-2026-24450)\n\n* LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading (CVE-2026-21413)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11360",
"url": "https://access.redhat.com/errata/RHSA-2026:11360"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2455925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455925"
},
{
"category": "external",
"summary": "2455929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455929"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11360.json"
}
],
"title": "Red Hat Security Advisory: LibRaw security update",
"tracking": {
"current_release_date": "2026-05-05T06:50:02+00:00",
"generator": {
"date": "2026-05-05T06:50:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:11360",
"initial_release_date": "2026-04-28T13:55:31+00:00",
"revision_history": [
{
"date": "2026-04-28T13:55:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-28T13:55:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-05T06:50:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "LibRaw-0:0.21.1-2.el9_7.src",
"product": {
"name": "LibRaw-0:0.21.1-2.el9_7.src",
"product_id": "LibRaw-0:0.21.1-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw@0.21.1-2.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "LibRaw-0:0.21.1-2.el9_7.aarch64",
"product": {
"name": "LibRaw-0:0.21.1-2.el9_7.aarch64",
"product_id": "LibRaw-0:0.21.1-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw@0.21.1-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"product": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"product_id": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debugsource@0.21.1-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"product": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"product_id": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.21.1-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"product": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"product_id": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.21.1-2.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "LibRaw-0:0.21.1-2.el9_7.ppc64le",
"product": {
"name": "LibRaw-0:0.21.1-2.el9_7.ppc64le",
"product_id": "LibRaw-0:0.21.1-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw@0.21.1-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"product": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"product_id": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debugsource@0.21.1-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"product": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"product_id": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.21.1-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"product": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"product_id": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.21.1-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"product": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"product_id": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-devel@0.21.1-2.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "LibRaw-0:0.21.1-2.el9_7.i686",
"product": {
"name": "LibRaw-0:0.21.1-2.el9_7.i686",
"product_id": "LibRaw-0:0.21.1-2.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw@0.21.1-2.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"product": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"product_id": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debugsource@0.21.1-2.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"product": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"product_id": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.21.1-2.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"product": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"product_id": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.21.1-2.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "LibRaw-devel-0:0.21.1-2.el9_7.i686",
"product": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.i686",
"product_id": "LibRaw-devel-0:0.21.1-2.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-devel@0.21.1-2.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "LibRaw-0:0.21.1-2.el9_7.x86_64",
"product": {
"name": "LibRaw-0:0.21.1-2.el9_7.x86_64",
"product_id": "LibRaw-0:0.21.1-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw@0.21.1-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"product": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"product_id": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debugsource@0.21.1-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"product": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"product_id": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.21.1-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"product": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"product_id": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.21.1-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"product": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"product_id": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-devel@0.21.1-2.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "LibRaw-0:0.21.1-2.el9_7.s390x",
"product": {
"name": "LibRaw-0:0.21.1-2.el9_7.s390x",
"product_id": "LibRaw-0:0.21.1-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw@0.21.1-2.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"product": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"product_id": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debugsource@0.21.1-2.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"product": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"product_id": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-debuginfo@0.21.1-2.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"product": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"product_id": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/LibRaw-samples-debuginfo@0.21.1-2.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-devel-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-devel-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
},
"product_reference": "LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-21413",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2026-04-07T15:01:55.132167+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455929"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in LibRaw. A heap-based buffer overflow vulnerability exists in the `lossless_jpeg_load_raw` functionality. A remote attacker can exploit this by providing a specially crafted malicious file. This can lead to arbitrary code execution, allowing the attacker to take control of the affected system, or cause a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "LibRaw is not installed by default on Red Hat systems. A user would need to manually install and make available an affected code path for this vulnerability to be exploitable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21413"
},
{
"category": "external",
"summary": "RHBZ#2455929",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455929"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21413"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21413",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21413"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2026-2331",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2026-2331"
}
],
"release_date": "2026-04-07T13:49:29.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T13:55:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11360"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading"
},
{
"cve": "CVE-2026-24450",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-04-07T15:01:24.102965+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455925"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in LibRaw. A remote attacker could exploit an integer overflow vulnerability by providing a specially crafted malicious file. This flaw, located in the `uncompressed_fp_dng_load_raw` functionality, leads to a heap buffer overflow. Successful exploitation may result in arbitrary code execution or a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LibRaw: LibRaw: Arbitrary code execution via a specially crafted malicious file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw in the LibRaw library consists in an integer overflow in the `uncompressed_fp_dng_load_raw` function, a successfully performed attack may lead to a heap buffer overflow and potentially arbitrary code execution or denial of service. The vulnerability stems from the usage of a 32-bit arithmetic to calculate the pixel buffers when decoding the raw image file, which may end up overflowing when processing user controlled images as input. The calculation result is further used within 64-bit boundary checking however the proper cast is missing and the result value is used to allocate the buffer from memory, when the overflow happens the function may start writing outside of the expected memory boundary leading to data corruption.\n\nThis vulnerability is not exploitable when the application consuming LibRaw is using the default memory limit (`max_raw_memory_mb` parameter) to unpack the RAW image. To be considered vulnerable the application should be setting the limit to around or greater then 16GB.\n\nRed Hat Product Security has rated this vulnerability as having a Moderate impact, despite the possibility of arbitrary code execution due to the heap-based buffer overflow, as the user needs to be tricked to process a maliciously crafted image or LibRaw needs to be exposed to the network and accepting untrusted data as input. Additionally the default `max_raw_memory_mb` value set with LibRaw is not enough to trigger the vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24450"
},
{
"category": "external",
"summary": "RHBZ#2455925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455925"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24450"
},
{
"category": "external",
"summary": "https://github.com/LibRaw/LibRaw/releases/tag/0.22.1",
"url": "https://github.com/LibRaw/LibRaw/releases/tag/0.22.1"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2026-2363",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2026-2363"
}
],
"release_date": "2026-04-07T13:49:23.872000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-28T13:55:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11360"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by limiting the amount of memory used to unpack untrusted RAW images. This needs to be set in the application using the LibRaw and can be achieved by setting the `max_raw_memory_mb` to a value smaller than 16GB.\nThis parameter can\u0027t be changed in runtime in the library, so developers needs to patch and rebuild their application to impose the new limit. It\u0027s important to notice the fact when reducing the memory limit for the decoding process may render the library unable to handle big images.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.src",
"CRB-9.7.0.Z.MAIN:LibRaw-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debuginfo-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-debugsource-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-devel-0:0.21.1-2.el9_7.x86_64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.aarch64",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.i686",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.ppc64le",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.s390x",
"CRB-9.7.0.Z.MAIN:LibRaw-samples-debuginfo-0:0.21.1-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "LibRaw: LibRaw: Arbitrary code execution via a specially crafted malicious file"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…