ALT-BU-2024-17694-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2022-00105
Уязвимость программного обеспечения для разработки и массового производства печатных плат Gerbv, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код
BDU:2022-00106
Уязвимость программного обеспечения для разработки и массового производства печатных плат Gerbv, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-40391
An out-of-bounds write vulnerability exists in the drill format T-code tool number functionality of Gerbv 2.7.0, dev (commit b5f1eacd), and the forked version of Gerbv (commit 71493260). A specially-crafted drill file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
- [debian-lts-announce] 20211203 [SECURITY] [DLA 2839-1] gerbv security update
- [debian-lts-announce] 20211203 [SECURITY] [DLA 2839-1] gerbv security update
- FEDORA-2022-4a3ef86baa
- FEDORA-2022-4a3ef86baa
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402
Modified: 2024-11-21
CVE-2021-40393
An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
- [debian-lts-announce] 20230930 [SECURITY] [DLA 3593-1] gerbv security update
- [debian-lts-announce] 20230930 [SECURITY] [DLA 3593-1] gerbv security update
- FEDORA-2023-5f5bea627b
- FEDORA-2023-5f5bea627b
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
- DSA-5306
- DSA-5306
Modified: 2024-11-21
CVE-2021-40394
An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
- [debian-lts-announce] 20230930 [SECURITY] [DLA 3593-1] gerbv security update
- [debian-lts-announce] 20230930 [SECURITY] [DLA 3593-1] gerbv security update
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
- DSA-5306
- DSA-5306
Modified: 2024-11-21
CVE-2021-40400
An out-of-bounds read vulnerability exists in the RS-274X aperture macro outline primitive functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit d7f42a9a). A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
Modified: 2024-11-21
CVE-2021-40401
A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Modified: 2024-11-21
CVE-2021-40403
An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.
Modified: 2024-11-21
CVE-2023-4508
A user able to control file input to Gerbv, between versions 2.4.0 and 2.10.0, can cause a crash and cause denial-of-service with a specially crafted Gerber RS-274X file.
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4508
- https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a
- https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a
- https://github.com/gerbv/gerbv/issues/191
- https://github.com/gerbv/gerbv/issues/191
Package openconnect updated to version 8.10-alt1 for branch c9f2 in task 299473.
Closed vulnerabilities
BDU:2020-01355
Уязвимость функции process_http_response приложения для подключения к виртуальным частным сетям OpenConnect, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2023-07616
Уязвимость функции X509_check_ VPN-клиента OpenConnect, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-16239
process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
- http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
- http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
- openSUSE-SU-2019:2385
- openSUSE-SU-2019:2385
- openSUSE-SU-2019:2388
- openSUSE-SU-2019:2388
- [debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update
- [debian-lts-announce] 20191004 [SECURITY] [DLA 1945-1] openconnect security update
- FEDORA-2019-4c0d6e1784
- FEDORA-2019-4c0d6e1784
- FEDORA-2019-1caffa01f2
- FEDORA-2019-1caffa01f2
- FEDORA-2019-6969467639
- FEDORA-2019-6969467639
- 20200120 [SECURITY] [DSA 4607-1] openconnect security update
- 20200120 [SECURITY] [DSA 4607-1] openconnect security update
- https://t2.fi/schedule/2019/
- https://t2.fi/schedule/2019/
- USN-4565-1
- USN-4565-1
- DSA-4607
- DSA-4607
Modified: 2024-11-21
CVE-2020-12105
OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15522
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
Modified: 2024-11-21
CVE-2019-15523
An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.
- https://github.com/LINBIT/csync2/pull/13/commits/92742544a56bcbcd9ec99ca15f898b31797e39e2
- https://github.com/LINBIT/csync2/pull/13/commits/92742544a56bcbcd9ec99ca15f898b31797e39e2
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2515-1] csync2 security update
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2515-1] csync2 security update
Closed bugs
Could not open libsqlite3.so