|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0157 (openscad)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0157: Updated openscad package fixes a security vulnerability
Date:  Sat, 27 Mar 2021 15:28:21 +0100
Message-ID:  <20210327142821.D90179FE73@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0157 - Updated openscad package fixes a security vulnerability Publication date: 27 Mar 2021 URL: https://advisories.mageia.org/MGASA-2021-0157.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2020-28599 Description: A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability (CVE-2020-28599). References: - https://bugs.mageia.org/show_bug.cgi?id=28537 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2... SRPMS: - 7/core/openscad-2019.05-1.1.mga7 - 8/core/openscad-2021.01-1.mga8


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds