It was discovered that GEGL incorrectly filtered and escaped file path input data when using the C system() function for execution of the ImageMagick convert command. An attacker could possibly use this to execute arbitrary code.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "gegl",
"binary_version": "0.2.0-4ubuntu1+esm1"
},
{
"binary_name": "libgegl-0.2-0",
"binary_version": "0.2.0-4ubuntu1+esm1"
},
{
"binary_name": "libgegl-dev",
"binary_version": "0.2.0-4ubuntu1+esm1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "gegl",
"binary_version": "0.3.4-1ubuntu2+esm1"
},
{
"binary_name": "libgegl-0.3-0",
"binary_version": "0.3.4-1ubuntu2+esm1"
},
{
"binary_name": "libgegl-dev",
"binary_version": "0.3.4-1ubuntu2+esm1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "gegl",
"binary_version": "0.3.30-1ubuntu1+esm1"
},
{
"binary_name": "gir1.2-gegl-0.3",
"binary_version": "0.3.30-1ubuntu1+esm1"
},
{
"binary_name": "libgegl-0.3-0",
"binary_version": "0.3.30-1ubuntu1+esm1"
},
{
"binary_name": "libgegl-dev",
"binary_version": "0.3.30-1ubuntu1+esm1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "gegl",
"binary_version": "0.4.22-3ubuntu0.1~esm1"
},
{
"binary_name": "gir1.2-gegl-0.4",
"binary_version": "0.4.22-3ubuntu0.1~esm1"
},
{
"binary_name": "libgegl-0.4-0",
"binary_version": "0.4.22-3ubuntu0.1~esm1"
},
{
"binary_name": "libgegl-common",
"binary_version": "0.4.22-3ubuntu0.1~esm1"
},
{
"binary_name": "libgegl-dev",
"binary_version": "0.4.22-3ubuntu0.1~esm1"
}
]
}