lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument, because the GNU Guile code uses the system Scheme procedure instead of the system* Scheme procedure. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-17523.
{
"binaries": [
{
"binary_name": "lilypond",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-data",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-cs",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-de",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-es",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-fr",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-hu",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-it",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-ja",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-nl",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-html-zh",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf-de",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf-es",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf-fr",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf-hu",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf-it",
"binary_version": "2.18.2-12build1"
},
{
"binary_name": "lilypond-doc-pdf-nl",
"binary_version": "2.18.2-12build1"
}
]
}