Bug#513419: nautilus-python: CVE-2009-0317 untrusted search path vulnerability

Nico Golde nion at debian.org
Wed Jan 28 22:12:16 UTC 2009


Package: nautilus-python
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for nautilus-python.

CVE-2009-0317[0]:
| Untrusted search path vulnerability in the Python language bindings
| for Nautilus (nautilus-python) allows local users to execute arbitrary
| code via a Trojan horse Python file in the current working directory,
| related to a vulnerability in the PySys_SetArgv function
| (CVE-2008-5983).

To fix this you need to patch src/nautilus-python.c in the 
same way as 
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=CVE-2009-0318.patch;att=1;bug=513418
should be sufficient.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0317
    http://security-tracker.debian.net/tracker/CVE-2009-0317

-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20090128/9324db77/attachment.pgp 


More information about the pkg-gnome-maintainers mailing list