First published: Fri Feb 04 2022(Updated: )
An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gerbv | <=2.7.0-1+deb10u1 | 2.7.0-1+deb10u3 2.7.0-2+deb11u2 2.9.6-1 2.10.0-1 |
Gerbv | =2.7.0 | |
Gerbv | =2.8.0-forked_dev | |
Fedora | =36 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40403 is classified as an information disclosure vulnerability.
To fix CVE-2021-40403, upgrade Gerbv to version 2.8.0 or later.
CVE-2021-40403 affects Gerbv versions 2.7.0 and 2.8.0 (forked dev version).
An attacker can exploit CVE-2021-40403 to leak sensitive memory contents through specially-crafted pick-and-place files.
Yes, CVE-2021-40403 can affect users running specific versions of Fedora that use the vulnerable Gerbv package.