An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.
The product does not initialize critical variables, which causes the execution environment to use unexpected values.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gerbv | Gerbv_project | 2.7.0 (including) | 2.7.0 (including) |
Gerbv | Gerbv_project | 2.8.0-forked_dev (including) | 2.8.0-forked_dev (including) |
Gerbv | Ubuntu | bionic | * |
Gerbv | Ubuntu | esm-apps/bionic | * |
Gerbv | Ubuntu | esm-apps/jammy | * |
Gerbv | Ubuntu | esm-apps/xenial | * |
Gerbv | Ubuntu | focal | * |
Gerbv | Ubuntu | impish | * |
Gerbv | Ubuntu | trusty | * |
Gerbv | Ubuntu | xenial | * |