Bug 2187166 (CVE-2020-17354) - CVE-2020-17354 LilyPond: Lilypond allows attackers to bypass the -dsafe protection mechanism
Summary: CVE-2020-17354 LilyPond: Lilypond allows attackers to bypass the -dsafe prote...
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2020-17354
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2187167
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-04-17 06:33 UTC by Avinash Hanwate
Modified: 2023-04-17 11:05 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2023-04-17 11:05:04 UTC
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-04-17 06:33:31 UTC
LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used.

https://tracker.debian.org/news/1249694/accepted-lilypond-2221-1-source-into-unstable/
https://phabricator.wikimedia.org/T259210
https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory
https://gitlab.com/lilypond/lilypond/-/merge_requests/1522
http://lilypond.org/doc/v2.18/Documentation/usage/command_002dline-usage
https://lilypond.org/download.html

Comment 1 Avinash Hanwate 2023-04-17 06:33:51 UTC
Created lilypond tracking bugs for this issue:

Affects: fedora-all [bug 2187167]

Comment 2 Product Security DevOps Team 2023-04-17 11:05:02 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.