Bug 1528415 (CVE-2017-17531) - CVE-2017-17531 global: Command injection in gozilla.c
Summary: CVE-2017-17531 global: Command injection in gozilla.c
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2017-17531
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1528416 1528417
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-12-21 19:43 UTC by Pedro Sampaio
Modified: 2019-09-29 14:28 UTC (History)
3 users (show)

Fixed In Version: global 6.6.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-07-12 13:04:37 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2017-12-21 19:43:41 UTC
gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the
program specified by the BROWSER environment variable, which might allow remote
attackers to conduct argument-injection attacks via a crafted URL.

Upstream patch:

http://cvs.savannah.gnu.org/viewvc/global/global/gozilla/gozilla.c?r1=1.70&r2=1.71
http://cvs.savannah.gnu.org/viewvc/global/global/gozilla/gozilla.c?r1=1.70&r2=1.71&view=patch

References:

http://lists.gnu.org/archive/html/global-commit/2017-12/msg00003.html
http://cvs.savannah.gnu.org/viewvc/global/global/NEWS?r1=1.195&r2=1.196

Comment 1 Pedro Sampaio 2017-12-21 19:44:35 UTC
Created global tracking bugs for this issue:

Affects: epel-7 [bug 1528417]
Affects: fedora-all [bug 1528416]

Comment 2 Product Security DevOps Team 2019-07-12 13:04:37 UTC
ARRAY(0x558ebd6fba78)


Note You need to log in before you can comment on or make changes to this bug.