Hi,

Nico Golde wrote:
> Source: xdg-utils
> Severity: grave
> Tags: security patch
> 
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for xdg-utils.

The code in question is not present in the Debian package, because I have
patched it to use run-mailcap or sensible-browser instead.

The code:

> |   browser_with_arg=`echo "$browser" | sed s#%s#"$1"#`
> | 
> |   if [ x"$browser_with_arg" = x"$browser" ]; then "$browser" "$1";
> |     else $browser_with_arg;
> |   fi

has been replaced by the patch debian/patches/xdg-open-generic with:

    if which run-mailcap >/dev/null &&
        (echo "$1" | grep -q '^file://' ||
            ! echo "$1" | egrep -q '^[a-zA-Z+\.\-]+:'); then

        local file=$(echo "$1" | sed 's%^file://%%')

        run-mailcap --action=view "$file"
    else
        sensible-browser "$1"
    fi

which does not use sed in the insecure way referred to by the CVE.

-- 
Pelle



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to