The _mediaLibraryPlayCb function in mainwindow.py in pitivi before 0.95 allows attackers to execute arbitrary code via shell metacharacters in a file path.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/97283 | vdb entry |
https://git.gnome.org/browse/pitivi/commit/?id=45a4c84edb3b4343f199bba1c65502e3f49f5bb2 | patch third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2015/12/23/8 | patch mailing list third party advisory |
https://bugs.launchpad.net/ubuntu/+source/pitivi/+bug/1495272 | third party advisory issue tracking |