Source: tinygltf Version: 2.5.0+dfsg-4 Severity: important Tags: security upstream Forwarded: https://github.com/syoyo/tinygltf/issues/368 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 2.5.0+dfsg-3
Hi, The following vulnerability was published for tinygltf. CVE-2022-3008[0]: | The tinygltf library uses the C library function wordexp() to perform | file path expansion on untrusted paths that are provided from the | input file. This function allows for command injection by using | backticks. An attacker could craft an untrusted path input that would | result in a path expansion. We recommend upgrading to 2.6.0 or past | commit 52ff00a38447f06a17eab1caa2cf0730a119c751 If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-3008 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3008 [1] https://github.com/syoyo/tinygltf/issues/368 [2] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053 [3] https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751 Regards, Salvatore