Name | CVE-2021-32142 |
Description | Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1031790 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libraw (PTS) | buster | 0.19.2-2 | vulnerable |
buster (security) | 0.19.2-2+deb10u2 | vulnerable | |
bullseye | 0.20.2-1 | vulnerable | |
bookworm, sid | 0.20.2-2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libraw | source | experimental | 0.21.1-1 | |||
libraw | source | (unstable) | (unfixed) | 1031790 |
[bullseye] - libraw <no-dsa> (Minor issue)
[buster] - libraw <no-dsa> (Minor issue)
https://github.com/LibRaw/LibRaw/issues/400
https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49 (0.21-Beta1)