Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRawbufferdatastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.19.5-1ubuntu1.2", "binary_name": "libraw-bin" }, { "binary_version": "0.19.5-1ubuntu1.2", "binary_name": "libraw-bin-dbgsym" }, { "binary_version": "0.19.5-1ubuntu1.2", "binary_name": "libraw-dev" }, { "binary_version": "0.19.5-1ubuntu1.2", "binary_name": "libraw-doc" }, { "binary_version": "0.19.5-1ubuntu1.2", "binary_name": "libraw19" }, { "binary_version": "0.19.5-1ubuntu1.2", "binary_name": "libraw19-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.20.2-2ubuntu2.22.04.1", "binary_name": "libraw-bin" }, { "binary_version": "0.20.2-2ubuntu2.22.04.1", "binary_name": "libraw-bin-dbgsym" }, { "binary_version": "0.20.2-2ubuntu2.22.04.1", "binary_name": "libraw-dev" }, { "binary_version": "0.20.2-2ubuntu2.22.04.1", "binary_name": "libraw-doc" }, { "binary_version": "0.20.2-2ubuntu2.22.04.1", "binary_name": "libraw20" }, { "binary_version": "0.20.2-2ubuntu2.22.04.1", "binary_name": "libraw20-dbgsym" } ] }