CVE-2026-5318

| EUVD-2026-18116 MEDIUM
2026-04-02 VulDB GHSA-8qw7-rqx6-9gqj
5.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
P
Scope
X

Lifecycle Timeline

5
PoC Detected
Apr 07, 2026 - 12:16 vuln.today
Public exploit code
Analysis Generated
Apr 02, 2026 - 02:30 vuln.today
EUVD ID Assigned
Apr 02, 2026 - 02:30 euvd
EUVD-2026-18116
Patch Released
Apr 02, 2026 - 02:30 nvd
Patch available
CVE Published
Apr 02, 2026 - 01:45 nvd
MEDIUM 5.3

Description

A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.

Analysis

Out-of-bounds write in LibRaw's JPEG DHT parser (HuffTable::initval function) allows unauthenticated remote attackers to trigger a denial of service via malformed JPEG image files. LibRaw versions up to 0.22.0 are affected; publicly available exploit code exists. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: +20

Vendor Status

Debian

libraw
Release Status Fixed Version Urgency
bullseye vulnerable 0.20.2-1+deb11u1 -
bullseye (security) vulnerable 0.20.2-1+deb11u2 -
bookworm vulnerable 0.20.2-2.1+deb12u1 -
trixie vulnerable 0.21.4-2 -
forky, sid vulnerable 0.21.5b-1 -
(unstable) fixed (unfixed) -

Share

CVE-2026-5318 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy