-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-08d7ee21f7 2022-02-12 01:14:11.929405 --------------------------------------------------------------------------------
Name : libdxfrw Product : Fedora 34 Version : 1.0.1 Release : 3.fc34 URL : https://github.com/LibreCAD/libdxfrw Summary : Library to read/write DXF files Description : libdxfrw is a free C++ library to read and write DXF files in both formats, ASCII and binary form.
-------------------------------------------------------------------------------- Update Information:
Update librecad to 2.2.0 rc3. Apply fixes to libdxfrw and librecad for CVE-2021-45341, CVE-2021-45342, CVE-2021-45343. This also resolves the issue where some dwg files no longer opened. -------------------------------------------------------------------------------- ChangeLog:
* Tue Feb 1 2022 Tom Callaway spot@fedoraproject.org - 1.0.1-3 - apply fixes from upstream, including fix for CVE-2021-45343 * Thu Jan 20 2022 Fedora Release Engineering releng@fedoraproject.org - 1.0.1-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2027148 - librecad-2.2.0-rc3 is available https://bugzilla.redhat.com/show_bug.cgi?id=2027148 [ 2 ] Bug #2031379 - [regression] .dwg file no longer opens https://bugzilla.redhat.com/show_bug.cgi?id=2031379 [ 3 ] Bug #2046248 - CVE-2021-45341 librecad: buffer overflow in CDataMoji of the jwwlib component allows remote code execution via a crafted JWW document [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2046248 [ 4 ] Bug #2046252 - CVE-2021-45342 librecad: buffer overflow in CDataList of the jwwlib component allows remote code execution via a crafted JWW document [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2046252 [ 5 ] Bug #2046256 - CVE-2021-45343 librecad: NULL pointer dereference in the HATCH handling of libdxfrw can lead to DoS via a crafted DXF document [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2046256 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-08d7ee21f7' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------