UBUNTU-CVE-2020-17354

Source
https://ubuntu.com/security/CVE-2020-17354
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-17354.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2020-17354
Upstream
Published
2023-04-15T22:15:00Z
Modified
2025-07-18T16:45:59Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used.

References

Affected packages

Ubuntu:Pro:16.04:LTS / lilypond

Package

Name
lilypond
Purl
pkg:deb/ubuntu/lilypond@2.18.2-4.1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.18.2-4
2.18.2-4.1

Ubuntu:Pro:18.04:LTS / lilypond

Package

Name
lilypond
Purl
pkg:deb/ubuntu/lilypond@2.18.2-12build1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.18.2-9
2.18.2-11
2.18.2-12
2.18.2-12build1

Ubuntu:Pro:20.04:LTS / lilypond

Package

Name
lilypond
Purl
pkg:deb/ubuntu/lilypond@2.20.0-1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.19.81+really-2.18.2-13ubuntu1
2.19.81+really-2.18.2-13ubuntu2
2.19.81+really-2.18.2-14
2.20.0-1