gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. Upstream patch: http://cvs.savannah.gnu.org/viewvc/global/global/gozilla/gozilla.c?r1=1.70&r2=1.71 http://cvs.savannah.gnu.org/viewvc/global/global/gozilla/gozilla.c?r1=1.70&r2=1.71&view=patch References: http://lists.gnu.org/archive/html/global-commit/2017-12/msg00003.html http://cvs.savannah.gnu.org/viewvc/global/global/NEWS?r1=1.195&r2=1.196
Created global tracking bugs for this issue: Affects: epel-7 [bug 1528417] Affects: fedora-all [bug 1528416]
ARRAY(0x558ebd6fba78)