Hi Don,

On Thu, May 10, 2018 at 04:15:23PM -0700, Don Armstrong wrote:
> Control: unarchive 884136
> Control: found 884136 2.18.2-12
> Control: found 884136 2.19.81-1~exp1
> Control: forcemerge 884136 898373
> Control: tag 884136 confirmed
> 
> On Thu, 10 May 2018, Gabriel Corona wrote:
> > lilypond-invoke-editor as shipped in Debian is still vulnerable to
> > shell command injection in URIs (CVE-2017-17523).
> 
> Thanks for the report; we're actually shipping the upstream code with
> their fix to 2017-17523, but clearly that fix doesn't fix the whole
> thing, because they're using system instead of system*.
> 
> I'm testing a quick patch which should fix this issue, and I'll send it
> upstream once I know it's working.

I will request a new CVE id for the "incomplete fix for
CVE-2017-17523" (but no need to wait for that assignment for fixing
the issue).

Regards,
Salvatore

Reply via email to