Bug 2002271 (CVE-2021-3781)
Summary: | CVE-2021-3781 ghostscript: sandbox escape using '%pipe%' | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Cedric Buissart <cbuissar> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | akhaitovich, kyoneyam, mjg, mosvald, psampaio, rlescak, security-response-team, yozone, zdohnal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ghostpdl 9.55.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-29 07:25:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2002625, 2003085 | ||
Bug Blocks: | 2002161, 2002605 |
Description
Cedric Buissart
2021-09-08 11:46:13 UTC
Created ghostscript tracking bugs for this issue: Affects: fedora-all [bug 2003085] *** Bug 2002800 has been marked as a duplicate of this bug. *** |