Your message dated Wed, 3 Aug 2022 17:41:05 +0200
with message-id <[email protected]>
and subject line Re: librecad: CVE-2021-21897 - heap-based buffer overflow 
loading a DXF file via embedded dxflib
has caused the Debian Bug report #1010349,
regarding librecad: CVE-2021-21897 - heap-based buffer overflow loading a DXF 
file via embedded dxflib
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1010349: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010349
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: librecad
Version: 2.1.3-3
Severity: important
Tags: security
X-Debbugs-Cc: [email protected], Debian Security Team 
<[email protected]>

Hi,

The following vulnerability was published for librecad.

CVE-2021-21897[0]:
| A code execution vulnerability exists in the
| DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib
| 3.17.0. A specially-crafted .dxf file can lead to a heap buffer
| overflow. An attacker can provide a malicious file to trigger this
| vulnerability.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-21897
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21897

Please adjust the affected versions in the BTS as needed.


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.17.0-1-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Hi,

On Sat, 28 May 2022 18:36:29 +0200 Sylvain Beucler <[email protected]> wrote:
It appears librecad is not affected (all dists):

- the package uses system dxflib, cf. debian/patches/debian_build.patch

- while there appears to be similar vulnerable code in libraries/jwwlib/src/dl_jww-copy.cpp (grep for 'groupCode==42'), this particular file is not used in the build process AFAICT

Can you confirm and update the security tracker accordingly?

I marked CVE-2021-21897 as <not-affected> in the security tracker and I'm closing this bug.

Feel free to revert if needed.

Cheers!
Sylvain Beucler
Debian LTS Team

--- End Message ---

Reply via email to