• [gentoo-announce] [ GLSA 202107-35 ] OpenSCAD: Buffer overflow

    From John Helmert III@21:1/5 to All on Thu Jul 15 07:30:01 2021
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202107-35
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: OpenSCAD: Buffer overflow
    Date: July 15, 2021
    Bugs: #773217
    ID: 202107-35

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    A buffer overflow in OpenSCAD might allow remote attacker(s) to execute arbitrary code.

    Background
    ==========

    OpenSCAD is the programmer's solid 3D CAD modeller.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 media-gfx/openscad < 2021.01 >= 2021.01

    Description
    ===========

    A buffer overflow exists in OpenSCAD when parsing STL files.

    Impact
    ======

    A remote attacker could entice a user to open a specially crafted STL
    file using OpenSCAD, possibly resulting in execution of arbitrary code
    with the privileges of the process or a Denial of Service condition.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All OpenSCAD users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-gfx/openscad-2021.01"

    References
    ==========

    [ 1 ] CVE-2020-28599
    https://nvd.nist.gov/vuln/detail/CVE-2020-28599

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202107-35

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2021 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5


    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDvxVkACgkQXP0dAeB+ Izgh+A/+L6Ynt6NY+jXrHptYdMX2I5JWKIYV7W99AGhx+5gTHkdpjz7LcjOsGUbY wXbGAOKYwIm3EG0Nh6rCRv0VRzTn1z7TocFvxln4VnKM5KUwVOE19+M0hC6qblb5 AYJ0RUtomWpNqKeyABtkMwSHZWYZ3OBFksl/y6QsRIHNV9O1z1HaawHaV0qTsR93 467Kax0yU3vJS5mQpyLcSj8bANH4IHdk0es5rYa0Yd/t5Ee/XktEmcO3eATvpo+4 43ubGw4eII2pBV0exOKf2lPB2gH/h6bWt9rXg8OXPOZUDLYKAiGdAkKu/DyxbR/0 oF6gMW5HascqpaOK4+1GGu4IaU0UdvgAMbD+of3PFVXxDBRAasHfdm/2YvOnqawG Ysj/gaBwXBacmbsxMiEdkBOW3ougRLc0Dg26dS6LSF7SBURlG215hdH6tssSo8em bhgNk1pB2w4wcnjl6O34UfKPSChFC5qzi5CNNWi8Qf705n5zdTUisQdTyzf0ZUcL 3luOzV8I8HhKIvfJetUTbJovojYn+bNSlfkgbI/jCCdQB77O4g3iH/YY09A5HfNh 4o6v40UftalXL131Hsf7WMaS4fMtaBNqZPms/4WBeiQPN79FeEJsgESaymdhEYaC LJxy6mCiCYKMNXdPzOw/25c0ez31J+1g3IWSvcTYf9fFhYf1zyI=
    =SYlA
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)