First published: Wed Dec 22 2021(Updated: )
An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gerbv | <=2.7.0-1+deb10u1 | 2.7.0-1+deb10u3 2.7.0-2+deb11u2 2.9.6-1 2.10.0-1 |
Gerbv | =2.7.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40394 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2021-40394, update Gerbv to version 2.7.0-2 or later for Debian systems.
The affected software versions for CVE-2021-40394 include Gerbv versions up to 2.7.0-1+deb10u1.
Yes, CVE-2021-40394 can lead to arbitrary code execution when a malicious gerber file is processed.
No, CVE-2021-40394 is specific to Gerbv versions 2.7.0 and certain forked versions.