First published: Thu Apr 14 2022(Updated: )
An out-of-bounds read vulnerability exists in the RS-274X aperture macro multiple outline primitives functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.7.1 and 2.8.0. A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gerbv | =2.7.0 | |
Gerbv | =2.7.0-dev | |
Gerbv | =2.7.1 | |
Gerbv | =2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40402 is rated as medium severity due to its potential for information disclosure through specially crafted Gerber files.
To mitigate CVE-2021-40402, users should upgrade to Gerbv versions 2.7.2 or later which address the vulnerability.
CVE-2021-40402 affects Gerbv versions 2.7.0, 2.7.1, and 2.8.0.
CVE-2021-40402 is classified as an out-of-bounds read vulnerability.
Yes, an attacker can exploit CVE-2021-40402 by delivering a malicious Gerber file to the victim's system.