SB2025042840 - Ubuntu update for kicad
Published: April 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2022-23803)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Gerber Viewer gerber and excellon coordinates parsing functionality within "ReadXYCoord". A remote unauthenticated attacker can use a specially crafted gerber or excellon file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Stack-based buffer overflow (CVE-ID: CVE-2022-23946)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in "GCodeNumber" in the Gerber Viewer gerber and excellon GCode/Dcode parsing functionality. A remote unauthenticated attacker can #CONDITION2#, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Stack-based buffer overflow (CVE-ID: CVE-2022-23947)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in "DCodeNumber" in the Gerber Viewer gerber and excellon GCode/Dcode parsing functionality. A remote unauthenticated attacker can #CONDITION2#, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Stack-based buffer overflow (CVE-ID: CVE-2022-23804)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Gerber Viewer gerber and excellon coordinates parsing functionality within "ReadIJCoord". A remote unauthenticated attacker can use a specially crafted gerber or excellon file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.