-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-08d7ee21f7 2022-02-12 01:14:11.929405 -------------------------------------------------------------------------------- Name : libdxfrw Product : Fedora 34 Version : 1.0.1 Release : 3.fc34 URL : https://github.com/LibreCAD/libdxfrw Summary : Library to read/write DXF files Description : libdxfrw is a free C++ library to read and write DXF files in both formats, ASCII and binary form. -------------------------------------------------------------------------------- Update Information: Update librecad to 2.2.0 rc3. Apply fixes to libdxfrw and librecad for CVE-2021-45341, CVE-2021-45342, CVE-2021-45343. This also resolves the issue where some dwg files no longer opened. -------------------------------------------------------------------------------- ChangeLog: * Tue Feb 1 2022 Tom Callaway- 1.0.1-3 - apply fixes from upstream, including fix for CVE-2021-45343 * Thu Jan 20 2022 Fedora Release Engineering - 1.0.1-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #2027148 - librecad-2.2.0-rc3 is available https://bugzilla.redhat.com/show_bug.cgi?id=2027148 [ 2 ] Bug #2031379 - [regression] .dwg file no longer opens https://bugzilla.redhat.com/show_bug.cgi?id=2031379 [ 3 ] Bug #2046248 - CVE-2021-45341 librecad: buffer overflow in CDataMoji of the jwwlib component allows remote code execution via a crafted JWW document [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2046248 [ 4 ] Bug #2046252 - CVE-2021-45342 librecad: buffer overflow in CDataList of the jwwlib component allows remote code execution via a crafted JWW document [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2046252 [ 5 ] Bug #2046256 - CVE-2021-45343 librecad: NULL pointer dereference in the HATCH handling of libdxfrw can lead to DoS via a crafted DXF document [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2046256 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-08d7ee21f7' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure