{"id":"CVE-2021-40403","details":"An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.","modified":"2026-05-18T05:53:07.813464585Z","published":"2022-02-04T23:15:11.873Z","related":["openSUSE-SU-2024:12527-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"11.0"}],"source":"CPE_FIELD","vendor_product":"debian:debian_linux"},{"cpes":["cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"36"}],"source":"CPE_FIELD","vendor_product":"fedoraproject:fedora"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTGBC37N2FV7NKOWFVCFMPAFYEPHSB7C/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5306"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gerbv/gerbv","events":[{"introduced":"0"},{"last_affected":"3c70dc88260086e303ff8722dc9e6aec73e3b7e2"},{"last_affected":"e0c64540ff3ede9eabc199c073df8598fb4d12dd"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.7.0-NA"},{"last_affected":"2.8.0-forked_dev"}],"cpe":["cpe:2.3:a:gerbv_project:gerbv:2.7.0:-:*:*:*:*:*:*","cpe:2.3:a:gerbv_project:gerbv:2.8.0:forked_dev:*:*:*:*:*:*"]}}],"versions":["v2.8.0","v2.8.0-rc.1","gerbv-2-8-0-RC-1","v2.7.0","gerbv-2-7-RELEASE","v2.6.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-40403.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}]}