A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:5098 https://access.redhat.com/errata/RHSA-2022:5098
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:5096 https://access.redhat.com/errata/RHSA-2022:5096
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:5099 https://access.redhat.com/errata/RHSA-2022:5099
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:5095 https://access.redhat.com/errata/RHSA-2022:5095
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:5100 https://access.redhat.com/errata/RHSA-2022:5100
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3697