First published: Tue Apr 30 2024(Updated: )
George-Andrei Iosif and David Fernandez Gonzalez discovered that Gerbv did not properly initialize a data structure when parsing certain nested RS-274X format files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service (application crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gerbv | <2.9.8-1ubuntu0.1 | 2.9.8-1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/gerbv | <2.8.2-1ubuntu0.1~esm2 | 2.8.2-1ubuntu0.1~esm2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/gerbv | <2.7.0-1ubuntu0.2 | 2.7.0-1ubuntu0.2 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/gerbv | <2.6.1-3ubuntu0.1~esm2 | 2.6.1-3ubuntu0.1~esm2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/gerbv | <2.6.0-1ubuntu0.16.04.1~esm2 | 2.6.0-1ubuntu0.16.04.1~esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/gerbv | <2.6.0-1ubuntu0.14.04.1~esm2 | 2.6.0-1ubuntu0.14.04.1~esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6760-1 is classified as a security vulnerability that could potentially lead to application crashes.
To fix USN-6760-1, update the gerbv package to the latest version provided by your Ubuntu release.
USN-6760-1 affects several versions of Ubuntu including 14.04, 16.04, 18.04, 20.04, 22.04, and 23.10.
USN-6760-1 is caused by improper initialization of a data structure when parsing nested RS-274X format files.
Yes, USN-6760-1 can potentially be exploited if a user is tricked into opening a specially crafted file.