First published: Mon Apr 28 2025(Updated: )
It was discovered that KiCad incorrectly handled memory when opening malicious files. An attacker could possibly use this issue to cause a denial of service or execute arbitrary commands.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/kicad | <5.1.5+dfsg1-2ubuntu0.1~esm1 | 5.1.5+dfsg1-2ubuntu0.1~esm1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/kicad | <4.0.7+dfsg1-1ubuntu2+esm1 | 4.0.7+dfsg1-1ubuntu2+esm1 |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7466-1 is considered high due to its potential for causing denial of service and executing arbitrary commands.
To fix USN-7466-1, upgrade KiCad to versions 5.1.5+dfsg1-2ubuntu0.1~esm1 for Ubuntu 20.04 or 4.0.7+dfsg1-1ubuntu2+esm1 for Ubuntu 18.04.
USN-7466-1 affects KiCad versions prior to 5.1.5+dfsg1-2ubuntu0.1~esm1 and 4.0.7+dfsg1-1ubuntu2+esm1.
USN-7466-1 impacts Ubuntu 20.04 and 18.04 systems running vulnerable versions of KiCad.
An attacker could potentially cause a denial of service or execute arbitrary commands by exploiting USN-7466-1.