blob: 2e5d7da1047ef849f364aa6d2a770c19d4c2a90f [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200904-06">
<title>Eye of GNOME: Untrusted search path</title>
An untrusted search path vulnerability in the Eye of GNOME might result in
the execution of arbitrary code.
<product type="ebuild">eog</product>
<announced>April 06, 2009</announced>
<revised>April 06, 2009: 01</revised>
<package name="media-gfx/eog" auto="yes" arch="*">
<unaffected range="ge">2.22.3-r3</unaffected>
<vulnerable range="lt">2.22.3-r3</vulnerable>
The Eye of GNOME is the official image viewer for the GNOME Desktop
James Vega reported an untrusted search path vulnerability in the
GObject Python interpreter wrapper in the Eye of GNOME, a vulnerabiliy
related to CVE-2008-5983.
<impact type="normal">
A local attacker could entice a user to run the Eye of GNOME from a
directory containing a specially crafted python module, resulting in
the execution of arbitrary code with the privileges of the user running
the application.
Do not run "eog" from untrusted working directories.
All Eye of GNOME users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/eog-2.22.3-r3&quot;</code>
<uri link="">CVE-2008-5983</uri>
<uri link="">CVE-2008-5987</uri>
<metadata tag="submitter" timestamp="Mon, 06 Apr 2009 11:38:51 +0000">
<metadata tag="bugReady" timestamp="Mon, 06 Apr 2009 11:40:09 +0000">