{"id":"MGASA-2022-0325","summary":"Updated freecad packages fix security vulnerability","details":"Improper sanitization in the invocation of ODA File Converter from FreeCAD\n0.19 allows an attacker to inject OS commands via a crafted filename.\n(CVE-2021-45844)\n","modified":"2026-02-02T09:21:14.261184Z","published":"2022-09-16T19:39:55Z","related":["CVE-2021-45844"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0325.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30137"},{"type":"REPORT","url":"https://www.debian.org/lts/security/2022/dla-2934"},{"type":"REPORT","url":"https://www.debian.org/lts/security/2022/dla-3076"}],"affected":[{"package":{"name":"freecad","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/freecad?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.18.6-1.3.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0325.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}