CVE-2026-24450

NameCVE-2026-24450
DescriptionAn integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libraw (PTS)bullseye0.20.2-1+deb11u1vulnerable
bullseye (security)0.20.2-1+deb11u2vulnerable
bookworm0.20.2-2.1+deb12u1vulnerable
trixie0.21.4-2vulnerable
forky, sid0.21.5b-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
librawsource(unstable)(unfixed)

Notes

https://talosintelligence.com/vulnerability_reports/TALOS-2026-2363
https://github.com/LibRaw/LibRaw/commit/a58727c1a3cfef4101700e546a6a661c6a299d97

Search for package or bug name: Reporting problems