Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2023.0325
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2023-0325)
Zusammenfassung:The remote host is missing an update for the 'lilypond' package(s) announced via the MGASA-2023-0325 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'lilypond' package(s) announced via the MGASA-2023-0325 advisory.

Vulnerability Insight:
Updated lilypond packages fix a security vulnerability:

LilyPond before 2.24 allows attackers to bypass the -dsafe protection
mechanism via output-def-lookup or output-def-scope, as demonstrated by
dangerous Scheme code in a .ly file that causes arbitrary code execution
during conversion to a different file format. NOTE: in 2.24 and later
versions, safe mode is removed, and the product no longer tries to block
code execution when external files are used.

Affected Software/OS:
'lilypond' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-17354
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K43PF6VGFJNNGAPY57BW3VMEFFOSMRLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ST5BLLQ4GDME3SN7UE5OMNE5GZE66X4Y/
http://lilypond.org/doc/v2.18/Documentation/usage/command_002dline-usage
https://lilypond.org/download.html
https://phabricator.wikimedia.org/T259210
https://tracker.debian.org/news/1249694/accepted-lilypond-2221-1-source-into-unstable/
https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.