Mageia 2021-0239: cgal security update
Summary
Updated cgal packages fix security vulnerabilities:
An oob read vulnerability exists in Nef_2/PM_io_parser.h
PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide
malicious input to trigger this vulnerability (CVE-2020-28601).
An oob read vulnerability exists in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious
input to trigger this vulnerability (CVE-2020-28636).
An oob read vulnerability exists in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide
malicious input to trigger this vulnerability (CVE-2020-35628).
An oob read vulnerability exists in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sface() sfh->volume(). An attacker can provide malicious
input to trigger this vulnerability (CVE-2020-35636).
The cgal package has been updated to version 5.2.1, fixing the issues and other
bugs. The openfoam and openscad packages have been rebuilt against the updated
cgal library.
References
- https://bugs.mageia.org/show_bug.cgi?id=28881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/E4J344OKKDLPRN422OYRR46HDEN6MM6P/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35628
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35636
Resolution
MGASA-2021-0239 - Updated cgal packages fix security vulnerabilities
SRPMS
- 8/core/cgal-5.2.1-1.mga8
- 8/core/openfoam-7-17.1.mga8
- 8/core/openscad-2021.01-1.1.mga8