An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve code execution.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Link | Tags |
---|---|
https://gitlab.xfce.org/xfce/thunar/-/commit/9165a61f95e43cc0b5abf9b98eee2818a0191e0b | patch |
https://gitlab.xfce.org/xfce/thunar/-/commit/3b54d9d7dbd7fd16235e2141c43a7f18718f5664 | patch |
https://www.openwall.com/lists/oss-security/2021/05/09/2 | third party advisory mailing list |
https://gitlab.xfce.org/xfce/thunar/-/tags | release notes |
http://www.openwall.com/lists/oss-security/2021/05/11/3 | third party advisory mailing list |
https://gitlab.xfce.org/xfce/thunar/-/commit/1b85b96ebf7cb9bf6a3ddf1acee7643643fdf92d | patch |
http://www.openwall.com/lists/oss-security/2023/01/05/1 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/01/05/2 | third party advisory mailing list |