An update for xdg-utils is now available for openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1228 Final 1.0 1.0 2021-06-22 Initial 2021-06-22 2021-06-22 openEuler SA Tool V1.0 2021-06-22 xdg-utils security update An update for xdg-utils is now available for openEuler-20.03-LTS-SP1. The xdg-utils package is a set of simple scripts that provide basic desktop integration functions for any Free Desktop, such as Linux. The following tools are included in xdg-utils: * xdg-desktop-menu Install desktop menu items * xdg-desktop-icon Install icons to the desktop * xdg-icon-resource Install icon resources * xdg-mime Query information about file type handling and install descriptions for new file types * xdg-open Open a file or URL in the user's preferred application * xdg-email Send mail using the user's preferred e-mail composer * xdg-screensaver Control the screensaver Security Fix(es): A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.(CVE-2020-27748) An update for xdg-utils is now available for openEuler-20.03-LTS-SP1. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium xdg-utils https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1228 https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-27748 https://nvd.nist.gov/vuln/detail/CVE-2020-27748 openEuler-20.03-LTS-SP1 xdg-utils-1.1.3-5.oe1.noarch.rpm xdg-utils-help-1.1.3-5.oe1.noarch.rpm xdg-utils-1.1.3-5.oe1.src.rpm A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird. 2021-06-22 CVE-2020-27748 openEuler-20.03-LTS-SP1 Medium 6.5 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N xdg-utils security update 2021-06-22 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1228