MGASA-2021-0157

Source
https://advisories.mageia.org/MGASA-2021-0157.html
Import Source
https://advisories.mageia.org/MGASA-2021-0157.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0157
Related
Published
2021-03-27T14:27:02Z
Modified
2021-03-27T13:25:58Z
Summary
Updated openscad package fixes a security vulnerability
Details

A stack-based buffer overflow vulnerability exists in the importstl.cc:importstl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability (CVE-2020-28599).

References
Credits

Affected packages

Mageia:7 / openscad

Package

Name
openscad
Purl
pkg:rpm/mageia/openscad?arch=source&distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2019.05-1.1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / openscad

Package

Name
openscad
Purl
pkg:rpm/mageia/openscad?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2021.01-1.mga8

Ecosystem specific

{
    "section": "core"
}