Bug 2294728 (CVE-2020-28594, CVE-2020-28595, CVE-2020-28596, CVE-2020-28598)
Summary: | CVE-2020-28598 CVE-2020-28594 CVE-2020-28595 CVE-2020-28596 prusa-slicer: Multiple vulnerabilities in prusa-slice since 2.2.0 | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | adelton |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2294729 | ||
Bug Blocks: |
Description
Pedro Sampaio
2024-06-28 18:17:57 UTC
Created prusa-slicer tracking bugs for this issue: Affects: fedora-all [bug 2294729] As for CVE-2020-28594 / https://talosintelligence.com/vulnerability_reports/TALOS-2020-1218: The code upstream has been different from the one in the report since 2021 with commit https://github.com/prusa3d/PrusaSlicer/commit/f9f99c4889ca595b48104a0ab77ad78c0ddea619 which specifically says that it checks for invalid data. The fix went to upstream release 2.3.1. As for CVE-2020-28595 / https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219: The code upstream has been different from the one in the report since 2021 with commit https://github.com/prusa3d/PrusaSlicer/commit/8a2a9dba2f8f94da0106b60df613cd04ada4d595#diff-9ab56fd8ed8bcc525320e0809f0eb30e40b711ed49e7aab5bc60c0cfcf7a8dcb. The stl_allocate is no longer called in the code. The fix went to upstream release 2.4.0. As for CVE-2020-28596 / https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220: The code upstream has been different from the one in the report since 2020 with commit https://github.com/prusa3d/PrusaSlicer/commit/ba9a9b4e7ac8863f52923a90a9290a8ab0660e89 which specifically says that it fixes buffer overflow. The fix went to upstream release 2.4.0. As for CVE-2020-28598 / https://talosintelligence.com/vulnerability_reports/TALOS-2020-1222: The code upstream has been different from the one in the report since 2021 with commit https://github.com/prusa3d/PrusaSlicer/commit/8a2a9dba2f8f94da0106b60df613cd04ada4d595#diff-86b904c5b1e56d10dbacff71e2c2c9307219bd261dedf11fcfb3a942935b10e3 which removed the invocation of mesh.repair(), so the code in admesh is not reached in this scenario. The fix went to upstream release 2.4.0. What are the expected steps from where? Two of those Talos pages have just Vendor Disclosure and Public Release, two also have Vendor patched. Who is the Vendor in this case? Is that the upstream (https://github.com/prusa3d/PrusaSlicer/) or someone else? Granted, the commits did not refer to any CVE identifiers, so the NVD also tracks them as unfixed. But then, it tracks them against cpe:2.3:a:prusa3d:prusaslicer:2.2.0:-:*:*:*:*:*:*, not against generic prusa slicer. |