blob: 57982930e616c3566fa973784ecb8eac2eeea91c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200903-41">
<title>gedit: Untrusted search path</title>
A vulnerability in gedit might allow local attackers to execute arbitrary
<product type="ebuild">gedit</product>
<announced>March 30, 2009</announced>
<revised>March 30, 2009: 01</revised>
<package name="app-editors/gedit" auto="yes" arch="*">
<unaffected range="rge">2.22.3-r1</unaffected>
<unaffected range="ge">2.24.3</unaffected>
<vulnerable range="lt">2.24.3</vulnerable>
gedit is a text editor for the GNOME desktop.
James Vega reported that gedit uses the current working directory when
searching for python modules, a vulnerability related to CVE-2008-5983.
<impact type="normal">
A local attacker could entice a user to open gedit from a specially
crafted environment, possibly resulting in the execution of arbitrary
code with the privileges of the user running the application.
Do not run gedit from untrusted working directories.
All gedit 2.22.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.22.3-r1&quot;</code>
All gedit 2.24.x users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.24.3&quot;</code>
<uri link="">CVE-2008-5983</uri>
<uri link="">CVE-2009-0314</uri>
<metadata tag="requester" timestamp="Mon, 23 Mar 2009 09:17:57 +0000">
<metadata tag="submitter" timestamp="Mon, 30 Mar 2009 11:46:10 +0000">
<metadata tag="bugReady" timestamp="Mon, 30 Mar 2009 11:46:20 +0000">