First published: Tue Feb 21 2023(Updated: )
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. <a href="https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49">https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49</a> <a href="https://github.com/LibRaw/LibRaw/issues/400">https://github.com/LibRaw/LibRaw/issues/400</a>
Affected Software | Affected Version | How to fix |
---|---|---|
LibRaw |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2172004 is high due to the potential for privilege escalation via a buffer overflow.
To fix REDHAT-BUG-2172004, update to the latest version of LibRaw that addresses this buffer overflow vulnerability.
LibRaw linux/unix version 0.20.0 is affected by REDHAT-BUG-2172004.
The potential impacts of REDHAT-BUG-2172004 include unauthorized access and control over the system due to privilege escalation.
REDHAT-BUG-2172004 was reported through a Red Hat bug tracking system.