MGASA-2021-0239 - Updated cgal packages fix security vulnerabilities

Publication date: 08 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0239.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2020-28601,
     CVE-2020-28636,
     CVE-2020-35628,
     CVE-2020-35636

Updated cgal packages fix security vulnerabilities:

An oob read vulnerability exists in Nef_2/PM_io_parser.h
PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide
malicious input to trigger this vulnerability (CVE-2020-28601).

An oob read vulnerability exists in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious
input to trigger this vulnerability (CVE-2020-28636).

An oob read vulnerability exists in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide
malicious input to trigger this vulnerability (CVE-2020-35628).

An oob read vulnerability exists in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sface() sfh->volume(). An attacker can provide malicious
input to trigger this vulnerability (CVE-2020-35636).

The cgal package has been updated to version 5.2.1, fixing the issues and other
bugs.  The openfoam and openscad packages have been rebuilt against the updated
cgal library.

References:
- https://bugs.mageia.org/show_bug.cgi?id=28881
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/E4J344OKKDLPRN422OYRR46HDEN6MM6P/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28636
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35628
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35636

SRPMS:
- 8/core/cgal-5.2.1-1.mga8
- 8/core/openfoam-7-17.1.mga8
- 8/core/openscad-2021.01-1.1.mga8

Mageia 2021-0239: cgal security update

Updated cgal packages fix security vulnerabilities: An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read

Summary

Updated cgal packages fix security vulnerabilities:
An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability (CVE-2020-28601).
An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability (CVE-2020-28636).
An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability (CVE-2020-35628).
An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume(). An attacker can provide malicious input to trigger this vulnerability (CVE-2020-35636).
The cgal package has been updated to version 5.2.1, fixing the issues and other bugs. The openfoam and openscad packages have been rebuilt against the updated cgal library.

References

- https://bugs.mageia.org/show_bug.cgi?id=28881

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/E4J344OKKDLPRN422OYRR46HDEN6MM6P/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28601

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28636

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35628

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35636

Resolution

MGASA-2021-0239 - Updated cgal packages fix security vulnerabilities

SRPMS

- 8/core/cgal-5.2.1-1.mga8

- 8/core/openfoam-7-17.1.mga8

- 8/core/openscad-2021.01-1.1.mga8

Severity
Publication date: 08 Jun 2021
URL: https://advisories.mageia.org/MGASA-2021-0239.html
Type: security
CVE: CVE-2020-28601, CVE-2020-28636, CVE-2020-35628, CVE-2020-35636

Related News