A buffer overflow in OpenSCAD might allow remote attacker(s) to execute arbitrary code.
|Package||media-gfx/openscad on all architectures|
|Affected versions||< 2021.01|
|Unaffected versions||>= 2021.01|
OpenSCAD is the programmer’s solid 3D CAD modeller.
A buffer overflow exists in OpenSCAD when parsing STL files.
A remote attacker could entice a user to open a specially crafted STL file using OpenSCAD, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All OpenSCAD users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-gfx/openscad-2021.01"
July 15, 2021
July 15, 2021: 1