Package: lilypond
Version: 2.18.2-12
Severity: grave
Tags: security
Justification: user security hole

Hi,

lilypond-invoke-editor as shipped in Debian is still vulnerable to
shell command injection in URIs (CVE-2017-17523).

This is easily demonstrated by running this shell command using an
updated lilypond package which still spawns an xterm process:

BROWSER="firefox" lilypond-invoke-editor "http://www.example.com/&xterm";

The vulnerable code snippet is still present:

(define (run-browser uri)
  (system
   (if (getenv "BROWSER")
       (format #f "~a ~a" (getenv "BROWSER") uri)
       (format #f "firefox -remote 'OpenURL(~a,new-tab)'" uri))))

Upstream bug [1] is marked as fixed but it's actually not. It has ben
reported as Debian Bug 884136 which is marked as closed and archived.

[1] https://sourceforge.net/p/testlilyissues/issues/5243/

-- 
Gabriel


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable'), (90, 'unstable'), (1, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.15.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), 
LANGUAGE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages lilypond depends on:
ii  ghostscript        9.22~dfsg-2.1
ii  libc6              2.27-3
ii  libfontconfig1     2.13.0-4
ii  libfreetype6       2.8.1-2
ii  libgcc1            1:8-20180425-1
ii  libglib2.0-0       2.56.1-2
ii  libgmp10           2:6.1.2+dfsg-3
ii  libltdl7           2.4.6-2.1
ii  libpango-1.0-0     1.42.0-1
ii  libpangoft2-1.0-0  1.42.0-1
ii  libstdc++6         8-20180425-1
ii  lilypond-data      2.18.2-12
ii  python             2.7.15~rc1-1

Versions of packages lilypond recommends:
ii  texlive-latex-base  2018.20180416-1

Versions of packages lilypond suggests:
pn  lilypond-doc  <none>

-- no debconf information

Reply via email to