{"id":"CVE-2021-40403","details":"An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.","modified":"2026-04-16T04:30:24.112011677Z","published":"2022-02-04T23:15:11.873Z","related":["openSUSE-SU-2024:12527-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTGBC37N2FV7NKOWFVCFMPAFYEPHSB7C/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5306"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gerbv/gerbv","events":[{"introduced":"0"},{"last_affected":"3c70dc88260086e303ff8722dc9e6aec73e3b7e2"},{"introduced":"0"},{"last_affected":"e0c64540ff3ede9eabc199c073df8598fb4d12dd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.0-NA"},{"introduced":"0"},{"last_affected":"2.8.0-forked_dev"}]}}],"versions":["gerbv-2-7-RELEASE","gerbv-2-8-0-RC-1","v2.6.1","v2.7.0","v2.8.0","v2.8.0-rc.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-40403.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}]}