Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 1 Jan 2015 08:51:31 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: OSS Security Mailinglist <oss-security@...ts.openwall.com>
Cc: CVE Assignments MITRE <cve-assign@...re.org>
Subject: CVE Request: xdg-utils: xdg-open: command injection vulnerability

Hi

>From the references it is not clear, if a CVE was already requested in
past, but I have not found a reference here. xdg-open has a command
injection vulnerability, which was reported on [1] and [2]. The
Freedesktop.org Bug entry contains also a patch[3]. The issue was
hilighted again on the fulldisclosure list in [4].

In case it is not yet assigned, could you please assign a CVE for this
RCE for xdg-open in xdg-utils?

References:

 [1] https://bugs.gentoo.org/show_bug.cgi?id=472888
 [2] https://bugs.freedesktop.org/show_bug.cgi?id=66670
 [3] https://bugs.freedesktop.org/attachment.cgi?id=109536
 [4] http://seclists.org/fulldisclosure/2014/Nov/36
 [5] https://bugs.debian.org/773085

Regards,
Salvatore

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ