Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 846392 (CVE-2021-42700, CVE-2021-42702, CVE-2021-42704) - <media-gfx/inkscape-1.0: multiple vulnerabilities
Summary: <media-gfx/inkscape-1.0: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2021-42700, CVE-2021-42702, CVE-2021-42704
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://www.cisa.gov/uscert/ics/advis...
Whiteboard: B3 [glsa?]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-19 05:51 UTC by John Helmert III
Modified: 2023-10-28 21:54 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-19 05:51:48 UTC
CVE-2021-42700:

Inkscape 0.19 is vulnerable to an out-of-bounds read, which may allow an attacker to have access to unauthorized information.

CVE-2021-42702:

Inkscape version 0.19 can access an uninitialized pointer, which may allow an attacker to have access to unauthorized information.

CVE-2021-42704:

Inkscape version 0.19 is vulnerable to an out-of-bounds write, which may allow an attacker to arbitrary execute code.

URL is the only reference for these CVEs, no references to upstream to
verify where these issues were fixed. Unsure whether we're fixed.
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2023-04-03 20:37:25 UTC
These versions are long gone.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-20 04:02:53 UTC
(In reply to Andreas K. Hüttel from comment #1)
> These versions are long gone.

Where are the patches?
Comment 3 Andreas K. Hüttel archtester gentoo-dev 2023-06-12 20:23:12 UTC
> CVE-2021-42700:
> 
> Inkscape 0.19 is vulnerable to an out-of-bounds read, which may allow an
> attacker to have access to unauthorized information.

https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
"Inkscape has fixed these vulnerabilities and recommends users update to Version Inkscape 1.0 or later."


> CVE-2021-42702:
> 
> Inkscape version 0.19 can access an uninitialized pointer, which may allow
> an attacker to have access to unauthorized information.

https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
Inkscape has fixed these vulnerabilities and recommends users update to Version Inkscape 1.0 or later.


> CVE-2021-42704:
> 
> Inkscape version 0.19 is vulnerable to an out-of-bounds write, which may
> allow an attacker to arbitrary execute code.

https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
Inkscape has fixed these vulnerabilities and recommends users update to Version Inkscape 1.0 or later.
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-10-28 21:54:00 UTC
(In reply to Andreas K. Hüttel from comment #3)
> > CVE-2021-42700:
> > 
> > Inkscape 0.19 is vulnerable to an out-of-bounds read, which may allow an
> > attacker to have access to unauthorized information.
> 
> https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
> "Inkscape has fixed these vulnerabilities and recommends users update to
> Version Inkscape 1.0 or later."
> 
> 
> > CVE-2021-42702:
> > 
> > Inkscape version 0.19 can access an uninitialized pointer, which may allow
> > an attacker to have access to unauthorized information.
> 
> https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
> Inkscape has fixed these vulnerabilities and recommends users update to
> Version Inkscape 1.0 or later.
> 
> 
> > CVE-2021-42704:
> > 
> > Inkscape version 0.19 is vulnerable to an out-of-bounds write, which may
> > allow an attacker to arbitrary execute code.
> 
> https://www.cisa.gov/news-events/ics-advisories/icsa-22-132-03
> Inkscape has fixed these vulnerabilities and recommends users update to
> Version Inkscape 1.0 or later.

Why do we trust that CISA isn't using arbitrary version numbers that appear to be compatible with the CVEs? We need to be able to verify these things rather than trust seemingly arbitrary assertions by third parties.