An improper input sanitization flaw was found in the way feh,
the versatile and fast image viewer using imlib2, escaped URLs
to remote image files, to be reloaded. If a remote attacker could
trick the local user into opening a specially-crafted URL (where
that URL led to a valid file), it could lead to arbitrary code
execution with the privileges of the user running feh.
 feh --wget-timestamp 'https://derf.homelinux.org/stuff/bar`touch lol_hax`.jpg'
This issue affects the versions of the feh package, as shipped
with Fedora releases of 12 and 13.
Created feh tracking bugs for this issue
Affects: fedora-all [bug 608809]
CVE identifier of CVE-2010-2246 has been assigned to this.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.