CVE-2020-17354

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-17354
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-17354.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-17354
Related
Published
2023-04-15T22:15:06Z
Modified
2024-09-18T03:08:00.730989Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used.

References

Affected packages

Debian:11 / lilypond

Package

Name
lilypond
Purl
pkg:deb/debian/lilypond?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.22.0-10
2.22.1-1
2.22.1-2~bpo11+1
2.22.1-2
2.22.2-1
2.24.0-1
2.24.0-2
2.24.0-3
2.24.1-1
2.24.1-2
2.24.2-1
2.24.2-2
2.24.3-1
2.24.4-1
2.24.4-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / lilypond

Package

Name
lilypond
Purl
pkg:deb/debian/lilypond?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.22.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / lilypond

Package

Name
lilypond
Purl
pkg:deb/debian/lilypond?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.22.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}