A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gerbv | Gerbv_project | 2.7.0 (including) | 2.7.0 (including) |
Gerbv | Gerbv_project | 2.7.1-forked_dev (including) | 2.7.1-forked_dev (including) |
Gerbv | Ubuntu | bionic | * |
Gerbv | Ubuntu | esm-apps/bionic | * |
Gerbv | Ubuntu | esm-apps/jammy | * |
Gerbv | Ubuntu | esm-apps/xenial | * |
Gerbv | Ubuntu | focal | * |
Gerbv | Ubuntu | impish | * |
Gerbv | Ubuntu | trusty | * |
Gerbv | Ubuntu | xenial | * |