MGASA-2023-0325

Source
https://advisories.mageia.org/MGASA-2023-0325.html
Import Source
https://advisories.mageia.org/MGASA-2023-0325.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0325
Related
Published
2023-11-27T15:16:47Z
Modified
2023-11-27T13:48:17Z
Summary
Updated lilypond packages fix a security vulnerability
Details

Updated lilypond packages fix a security vulnerability:

LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used.

References
Credits

Affected packages

Mageia:9 / lilypond

Package

Name
lilypond
Purl
pkg:rpm/mageia/lilypond?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.24.2-2.mga9

Ecosystem specific

{
    "section": "core"
}