[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA-3210-1] gerbv security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3210-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
November 28, 2022                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : gerbv
Version        : 2.7.0-1+deb10u2
CVE IDs        : CVE-2021-40401 CVE-2021-40403

Two vulnerabilities were discovered gerbv, a Gerber file viewer. Most
Printed Circuit Board (PCB) design programs can export data to a
Gerber file.

* CVE-2021-40401: A use-after-free vulnerability existed in the
  RS-274X aperture definition tokenization functionality. A
  specially-crafted gerber file could have led to code execution.
 
* CVE-2021-40403: An information disclosure vulnerability existed in
  the pick-and-place rotation parsing functionality. A
  specially-crafted pick-and-place file could have exploited the
  missing initialization of a structure in order to leak memory
  contents.

For Debian 10 buster, these problems have been fixed in version
2.7.0-1+deb10u2.

We recommend that you upgrade your gerbv packages.

For the detailed security status of gerbv please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gerbv

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmOEm38ACgkQHpU+J9Qx
HlipkA//UbaS8psOeFz7kLhdTUEuwvLmhSYwbFNIeera9W4jj4LIR8X7fd63EdpV
IseTERC0u1bb6hvNmfyX65ecfdExcP5SgobrcRZ0A3R0d5+hneiJuBpwijifeI3V
MAYSozO3Jz9CCqUP7H0IffdOF0k44e1eT/rAt05ULx2rZWK/4c4vkYOHr76FsFQL
6BvqQ7CmOfV6rt32yhhsoUWBHKrKnrrfD3Z8zQMe1Cks/41piGf4OJHQGhmt0MQJ
kBkQRxhA80AsPoW3r4hHvyLmd5rM5qg1UsslndiqbHWk2Zq2/CYVucrU8e25yIWw
sMq8cfjgK1FnkVx7u52h63lMoBlmzUar8PBdR8ggjwce97f1gwUE5Vo5ODnhrHq/
F1SV5BhcbhEig64TdkeSbi2gOYXTKF294+cmqerBYAxnOf2ZIjsRV4cFDoBKuZGA
OvKMP/+BJaUa0uKD4MWfl3kAOOeOh38+yAt96dy8YXRJIbbCoAG3ryeNnxx/YO1x
Q310ha9zGNUQvlbAyvMzu7JnI+qipkGffSz3C8oYlK+ceHN1bFraKFRteM+LI6VB
RSl6Qv7qCDBLTMdP4LWe2HhMQ+JbLCp/10OovAbTKy9vwjIoTc1XG6h7lA8WrN27
T+ae7/AjXv422X0pbSq1fxAk6S8a5pnplLDIiw6Ph6OZTJwalzo=
=mXCH
-----END PGP SIGNATURE-----


Reply to: