GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Dec 04, 2016 8:26 am Post subject: [ GLSA 201612-05 ] Pygments |
|
|
Gentoo Linux Security Advisory
Title: Pygments: Arbitrary code execution (GLSA 201612-05)
Severity: normal
Exploitable: remote
Date: December 04, 2016
Bug(s): #564478
ID: 201612-05
Synopsis
Pygments is vulnerable to remote code execution if an attacker is
allowed to specify the font name.
Background
Pygments is a generic syntax highlighter suitable for use in code
hosting, forums, wikis or other applications that need to prettify source
code.
Affected Packages
Package: dev-python/pygments
Vulnerable: < 2.0.2-r1
Unaffected: >= 2.0.2-r1
Architectures: All supported architectures
Description
A vulnerability in FontManager’s _get_nix_font_path function allows
shell metacharacters to be passed in a font name.
Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the process.
Workaround
There is no known workaround at this time.
Resolution
All Pygments users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/pygments-2.0.2-r1"
|
References
CVE-2015-8557
|
|