Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:libraw:libraw:0.22.0:*:*:*:*:*:*:* cpe:2.3:a:libraw:libraw:0.22.1:*:*:*:*:*:*:* |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libraw
Libraw libraw |
|
| Vendors & Products |
Libraw
Libraw libraw |
Wed, 08 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. | |
| Weaknesses | CWE-129 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2026-04-08T03:55:50.134Z
Reserved: 2026-01-21T16:26:17.029Z
Link: CVE-2026-21413
Updated: 2026-04-07T16:23:23.212Z
Status : Analyzed
Published: 2026-04-07T15:17:35.633
Modified: 2026-04-10T20:51:09.687
Link: CVE-2026-21413
OpenCVE Enrichment
Updated: 2026-04-13T14:26:48Z