Incorrect Authorization Affecting lilypond package, versions <2.22.1-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.18% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-LILYPOND-3228699
  • published12 Jan 2023
  • disclosed15 Apr 2023

Introduced: 12 Jan 2023

CVE-2020-17354  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade Debian:unstable lilypond to version 2.22.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lilypond package and not the lilypond package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used.

CVSS Scores

version 3.1