Bug 2172004 (CVE-2021-32142) - CVE-2021-32142 LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp
Summary: CVE-2021-32142 LibRaw: stack buffer overflow in LibRaw_buffer_datastream::get...
Status: NEW
Alias: CVE-2021-32142
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 2172134 2172135 Red Hat2172140 2172133 2172136 Red Hat2172138 Red Hat2172139
Blocks: Embargoed2171901
TreeView+ depends on / blocked
Reported: 2023-02-21 07:36 UTC by TEJ RATHI
Modified: 2023-04-24 14:48 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the LibRaw package. A stack buffer overflow in the LibRaw_buffer_datastream::gets() function in src/libraw_datastream.cpp caused by a maliciously crafted file may result in compromised confidentiality and integrity and an application crash.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description TEJ RATHI 2023-02-21 07:36:11 UTC
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.


Comment 1 Marian Rehak 2023-02-21 15:06:31 UTC
Created LibRaw tracking bugs for this issue:

Affects: fedora-all [bug 2172133]

Created digikam tracking bugs for this issue:

Affects: epel-all [bug 2172134]
Affects: fedora-all [bug 2172135]

Created mingw-LibRaw tracking bugs for this issue:

Affects: fedora-all [bug 2172136]

Note You need to log in before you can comment on or make changes to this bug.