On Mon, Dec 03, 2007 at 11:31:27AM +0100, Gerd Hoffmann wrote:
> Moritz Muehlenhoff wrote:
> > Since fbi is not suitable for non-interactive use and the filename would
> > need to contain the commands to be executed I don't consider this a
> > security problem. Still, it should be fixed.
> >   
> It is at least quite hard to exploit remotely.  Even when configuring
> fbi as image viewer in your text mode browser you'll usually end up with
> an mkstemp()-generated, /tmp/foo-xrks73w style filename being passed to
> fbi ...
> > CCing upstream. Gerd, the popen() call needs to be sanitised or replaced
> >   
> Fixed in cvs, patch attached for reference.

Thanks Gerd. Do you have fbi release plans within the next months? Otherwise
I'll apply the patch to the Debian package.

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to