USN-5251-1: GEGL vulnerability
27 July 2022
GEGL could be made to run programs if it received specially crafted input.
Releases
Packages
- gegl - Generic Graphics Library Test Program
Details
It was discovered that GEGL incorrectly filtered and escaped file path input
data when using the C system() function for execution of the ImageMagick convert
command. An attacker could possibly use this to execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04
-
gegl
-
0.4.22-3ubuntu0.1~esm1
Available with Ubuntu Pro
-
libgegl-0.4-0
-
0.4.22-3ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04
-
libgegl-0.3-0
-
0.3.30-1ubuntu1+esm1
Available with Ubuntu Pro
-
gegl
-
0.3.30-1ubuntu1+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
libgegl-0.3-0
-
0.3.4-1ubuntu2+esm1
Available with Ubuntu Pro
-
gegl
-
0.3.4-1ubuntu2+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
gegl
-
0.2.0-4ubuntu1+esm1
Available with Ubuntu Pro
-
libgegl-0.2-0
-
0.2.0-4ubuntu1+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.