Bug 2035383 (CVE-2021-45463)
Summary: | CVE-2021-45463 gegl: shell expansion via a crafted pathname | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | jridky, nphilipp |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Due to the use of the system command in the Magick-Load op used by gegl an attacker is able to craft a command line path that is able to lead to the execution of arbitrary shell commands that impacts availability, confidentiality and integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-01-19 12:00:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2035384, 2035416, 2035417, 2035418, 2035419, 2035420, 2035421, 2035422, 2035423, 2035424, 2035425, 2035426, 2035427, 2035428 | ||
Bug Blocks: | 2035385 |
Description
Guilherme de Almeida Suckevicz
2021-12-23 20:21:40 UTC
Created gegl04 tracking bugs for this issue: Affects: fedora-all [bug 2035384] Filed relevant trackers. However, at this time there is no gegl included in RHEL 9. Will keep an eye out for its possible inclusion in the future, but for right now, no effect on RHEL 9. There is no gegl04 in RHEL9 as it is requirement for GIMP package, which is currently unavailable for RHEL-9, once GIMP release new version, gegl04 in version 0.4.34 or higher will become part of RHEL9 as well. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0162 https://access.redhat.com/errata/RHSA-2022:0162 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0177 https://access.redhat.com/errata/RHSA-2022:0177 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0178 https://access.redhat.com/errata/RHSA-2022:0178 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0184 https://access.redhat.com/errata/RHSA-2022:0184 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-45463 |