Mageia 2021-0368: lib3mf security update
Summary
A use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP()
functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can
lead to code execution. An attacker can provide a malicious file to trigger
this vulnerability (CVE-2021-21772).
A new package 'act' is introduced to build newer version of lib3mf.
Also, openscad is rebuilt against this updated library.
References
- https://bugs.mageia.org/show_bug.cgi?id=29018
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WDGGB65YBQL662M3MOBNNJJNRNURW4TG/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21772
Resolution
MGASA-2021-0368 - Updated lib3mf packages fix security vulnerability
SRPMS
- 8/core/lib3mf-2.1.1-1.mga8
- 8/core/act-1.6.0-4.mga8
- 8/core/openscad-2021.01-1.2.mga8