DSA-3165-1 xdg-utils -- security update

Related Vulnerabilities: CVE-2015-1877  

Jiri Horner discovered a way to cause xdg-open, a tool that automatically opens URLs in a user's preferred application, to execute arbitrary commands remotely. This problem only affects /bin/sh implementations that don't sanitize local variables. Dash, which is the default /bin/sh in Debian is affected. Bash as /bin/sh is known to be unaffected. For the stable distribution (wheezy), this problem has been fixed in version 1.1.0~rc1+git20111210-6+deb7u3. For the upcoming stable (jessie) and unstable (sid) distributions, this problem will be fixed soon. We recommend that you upgrade your xdg-utils packages.

Debian Security Advisory

DSA-3165-1 xdg-utils -- security update

Date Reported:
21 Feb 2015
Affected Packages:
xdg-utils
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 777722.
In Mitre's CVE dictionary: CVE-2015-1877.
More information:

Jiri Horner discovered a way to cause xdg-open, a tool that automatically opens URLs in a user's preferred application, to execute arbitrary commands remotely.

This problem only affects /bin/sh implementations that don't sanitize local variables. Dash, which is the default /bin/sh in Debian is affected. Bash as /bin/sh is known to be unaffected.

For the stable distribution (wheezy), this problem has been fixed in version 1.1.0~rc1+git20111210-6+deb7u3.

For the upcoming stable (jessie) and unstable (sid) distributions, this problem will be fixed soon.

We recommend that you upgrade your xdg-utils packages.