blob: 1469f3decd8bb9ccde010d699c1bcb8d13e4b1c4 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201405-28">
<title>xmonad-contrib: Arbitrary code execution</title>
<synopsis>A remote command injection vulnerability has been discovered in
<product type="ebuild">xmonad-contrib</product>
<announced>May 28, 2014</announced>
<revised>May 28, 2014: 1</revised>
<package name="x11-wm/xmonad-contrib" auto="yes" arch="*">
<unaffected range="ge">0.11.2</unaffected>
<vulnerable range="lt">0.11.2</vulnerable>
<p>xmonad-contrib is a set of third party tiling algorithms,
configurations, and scripts for xmonad.
<p>A vulnerability in the Xmonad.Hooks.DynamicLog module could allow a
malicious website with a specially crafted title to inject commands into
the title bar which would be executed when the bar is clicked.
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process or cause a Denial of
Service condition.
<p>There is no known workaround at this time.</p>
<p>All xmonad-contrib users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=x11-wm/xmonad-contrib-0.11.2"
<uri link="">CVE-2013-1436</uri>
<metadata tag="requester" timestamp="Thu, 27 Feb 2014 13:53:05 +0000">
<metadata tag="submitter" timestamp="Wed, 28 May 2014 06:50:25 +0000">