Upstream information

CVE-2021-40401 at MITRE

Description

A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 10
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Changed
Confidentiality Impact High
Integrity Impact Low
Availability Impact High
CVSSv3 Version 3
SUSE Bugzilla entry: 1195671 [NEW]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • gerbv >= 2.9.4-1.1
  • gerbv-devel >= 2.9.4-1.1
  • libgerbv1 >= 2.9.4-1.1
Patchnames:
openSUSE-Tumbleweed-2024-12527


SUSE Timeline for this CVE

CVE page created: Sat Feb 5 05:03:31 2022
CVE page last modified: Tue Sep 3 19:21:12 2024