{"id":"MGASA-2023-0082","summary":"Updated libraw packages fix security vulnerability","details":"Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker\nto escalate privileges via the LibRaw_buffer_datastream::gets(char*, int)\nin /src/libraw/src/libraw_datastream.cpp. (CVE-2021-32142)\n","modified":"2026-01-31T07:52:19.713452Z","published":"2023-03-01T21:14:31Z","related":["CVE-2021-32142"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0082.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=31594"},{"type":"REPORT","url":"https://lists.suse.com/pipermail/sle-security-updates/2023-February/013886.html"}],"affected":[{"package":{"name":"libraw","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libraw?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.20.2-1.1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0082.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}