CVE-2018-10992

NameCVE-2018-10992
Descriptionlilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs898373

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lilypond (PTS)buster, buster (security)2.19.81+really-2.18.2-13+deb10u1fixed
bullseye2.22.0-10fixed
bookworm2.24.1-2fixed
sid, trixie2.24.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lilypondsourcewheezy(not affected)
lilypondsourcejessie(not affected)
lilypondsource(unstable)2.18.2-13898373

Notes

[jessie] - lilypond <not-affected> (Incomplete fix not applied)
[wheezy] - lilypond <not-affected> (Incomplete fix not applied)

Search for package or bug name: Reporting problems