Name | CVE-2022-23803 |
Description | A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadXYCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2998-1, DLA-3078-1, DSA-5214-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
kicad (PTS) | bullseye (security), bullseye | 5.1.9+dfsg1-1+deb11u1 | fixed |
bookworm | 6.0.11+dfsg-1 | fixed | |
trixie, sid | 8.0.6+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
kicad | source | stretch | 4.0.5+dfsg1-4+deb9u1 | DLA-2998-1 | ||
kicad | source | buster | 5.0.2+dfsg1-1+deb10u1 | DLA-3078-1 | ||
kicad | source | bullseye | 5.1.9+dfsg1-1+deb11u1 | DSA-5214-1 | ||
kicad | source | (unstable) | 6.0.2+dfsg-1 |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453
https://gitlab.com/kicad/code/kicad/-/issues/10719
https://gitlab.com/kicad/code/kicad/-/commit/927afe313d1f104391814ee7d5d9cca0a520aa50 (6.0.2)
https://gitlab.com/kicad/code/kicad/-/commit/7ed569058c516974c47b4a506daa3daea4248e05 (master)