First published: Thu Aug 24 2023(Updated: )
A user able to control file input to Gerbv, between versions 2.4.0 and 2.10.0, can cause a crash and cause denial-of-service with a specially crafted Gerber RS-274X file.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gerbv | <=2.7.0-1+deb10u1<=2.7.0-2+deb11u2<=2.9.6-1 | 2.7.0-1+deb10u3 2.10.0-1 |
ubuntu/gerbv | <2.6.1-3ubuntu0.1~ | 2.6.1-3ubuntu0.1~ |
ubuntu/gerbv | <2.7.0-1ubuntu0.2 | 2.7.0-1ubuntu0.2 |
ubuntu/gerbv | <2.8.2-1ubuntu0.1~ | 2.8.2-1ubuntu0.1~ |
ubuntu/gerbv | <2.9.8-1ubuntu0.1 | 2.9.8-1ubuntu0.1 |
ubuntu/gerbv | <2.10.0 | 2.10.0 |
ubuntu/gerbv | <2.6.0-1ubuntu0.16.04.1~ | 2.6.0-1ubuntu0.16.04.1~ |
Gerbv | >=2.4.0<=2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4508 is classified as a denial-of-service vulnerability due to potential crashes caused by specially crafted Gerber RS-274X files.
To fix CVE-2023-4508, upgrade Gerbv to version 2.10.0 or later or to any patched version as specified by your distribution.
Gerbv versions from 2.4.0 up to and including 2.10.0 are affected by CVE-2023-4508.
CVE-2023-4508 can cause a denial-of-service, resulting in application crashes when processing malicious files.
As of now, there have been no publicly reported exploits for CVE-2023-4508.