Updated cgal packages fix security vulnerabilities
Publication date: 08 Jun 2021Modification date: 08 Jun 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2020-28601 , CVE-2020-28636 , CVE-2020-35628 , CVE-2020-35636
Description
Updated cgal packages fix security vulnerabilities: An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability (CVE-2020-28601). An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability (CVE-2020-28636). An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability (CVE-2020-35628). An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume(). An attacker can provide malicious input to trigger this vulnerability (CVE-2020-35636). The cgal package has been updated to version 5.2.1, fixing the issues and other bugs. The openfoam and openscad packages have been rebuilt against the updated cgal library.
References
- https://bugs.mageia.org/show_bug.cgi?id=28881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/E4J344OKKDLPRN422OYRR46HDEN6MM6P/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35628
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35636
SRPMS
8/core
- cgal-5.2.1-1.mga8
- openfoam-7-17.1.mga8
- openscad-2021.01-1.1.mga8