Created attachment 425652 [details] ASan output I discovered that a crafted .desktop file is able to cause an heap-based buffer overflow I'm waiting for a feedback.
Could you tell me situations in which this might be used to manage untrusted files?
(In reply to Jason A. Donenfeld from comment #1) > Could you tell me situations in which this might be used to manage untrusted > files? Well, strictly speaking .desktop files can come from many sources, including the Gentoo tree or third party overlays. I do not expect such files to be security relevant so I don't always fully audit it myself (mea culpa). So if it can be exploitable there could be some attack vectors applicable from such a file in general.
(In reply to Jason A. Donenfeld from comment #1) > Could you tell me situations in which this might be used to manage untrusted > files? is Kristian's response enough?
No. Could you please tell me a vector that makes this a security vulnerability?
this can be public now,
(In reply to Agostino Sarubbo from comment #5) > this can be public now, OK