First published: Fri Feb 17 2023(Updated: )
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libraw Libraw | =0.20.0 | |
debian/libraw | <=0.19.2-2 | 0.19.2-2+deb10u4 0.20.2-1+deb11u1 0.20.2-2.1 0.21.1-7 |
debian/libraw | <=0.20.2-1<=0.20.2-2 | 0.21.1-1 0.20.2-2.1 0.20.2-1+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-32142.
The severity rating of CVE-2021-32142 is 7.8 (High).
CVE-2021-32142 is a Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 that allows an attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
The software version affected by CVE-2021-32142 is LibRaw linux/unix v0.20.0.
To fix CVE-2021-32142, update to version 0.20.2-2.1 or later of the LibRaw software.