Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2023.0325
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2023-0325)
Resumen:The remote host is missing an update for the 'lilypond' package(s) announced via the MGASA-2023-0325 advisory.
Descripción:Summary:
The remote host is missing an update for the 'lilypond' package(s) announced via the MGASA-2023-0325 advisory.

Vulnerability Insight:
Updated lilypond packages fix a security vulnerability:

LilyPond before 2.24 allows attackers to bypass the -dsafe protection
mechanism via output-def-lookup or output-def-scope, as demonstrated by
dangerous Scheme code in a .ly file that causes arbitrary code execution
during conversion to a different file format. NOTE: in 2.24 and later
versions, safe mode is removed, and the product no longer tries to block
code execution when external files are used.

Affected Software/OS:
'lilypond' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2020-17354
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K43PF6VGFJNNGAPY57BW3VMEFFOSMRLF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ST5BLLQ4GDME3SN7UE5OMNE5GZE66X4Y/
http://lilypond.org/doc/v2.18/Documentation/usage/command_002dline-usage
https://lilypond.org/download.html
https://phabricator.wikimedia.org/T259210
https://tracker.debian.org/news/1249694/accepted-lilypond-2221-1-source-into-unstable/
https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory
CopyrightCopyright (C) 2023 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.