Mageia 2022-0176: gerbv security update | LinuxSecurity.com

Advisories

MGASA-2022-0176 - Updated gerbv packages fix security vulnerability

Publication date: 12 May 2022
URL: https://advisories.mageia.org/MGASA-2022-0176.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-40403

An information disclosure vulnerability exists in the pick-and-place
rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd),
and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can
exploit the missing initialization of a structure to leak memory contents.
An attacker can provide a malicious file to trigger this vulnerability.
(CVE-2021-40403)

References:
- https://bugs.mageia.org/show_bug.cgi?id=30391
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/PTGBC37N2FV7NKOWFVCFMPAFYEPHSB7C/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40403

SRPMS:
- 8/core/gerbv-2.7.0-3.1.mga8

Mageia 2022-0176: gerbv security update

An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0

Summary

An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2021-40403)

References

- https://bugs.mageia.org/show_bug.cgi?id=30391

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/PTGBC37N2FV7NKOWFVCFMPAFYEPHSB7C/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40403

Resolution

MGASA-2022-0176 - Updated gerbv packages fix security vulnerability

SRPMS

- 8/core/gerbv-2.7.0-3.1.mga8

Severity
Publication date: 12 May 2022
URL: https://advisories.mageia.org/MGASA-2022-0176.html
Type: security
CVE: CVE-2021-40403

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.