Processed: Re: Processed (with 3 errors): Re: Processed (with 2 errors): Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper
Processing commands for cont...@bugs.debian.org: > found 513418 1.6.3-5.1+etch1 Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Bug marked as found in version 1.6.3-5.1+etch1. > fixed 513418 1.6.3-5.1+etch2 Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Bug marked as fixed in version 1.6.3-5.1+etch2. > found 513418 1.8.3-5 Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Bug marked as found in version 1.8.3-5. > fixed 513418 1.8.4-3 Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Bug marked as fixed in version 1.8.4-3. > found 513418 1.9.3-1 Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Bug marked as found in version 1.9.3-1. > # Not fixed in experimental > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed (with 2 errors): Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper
Processing commands for cont...@bugs.debian.org: > reopen 513418 Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper 'reopen' may be inappropriate when a bug has been closed with a version; you may need to use 'found' to remove fixed versions. Bug reopened, originator not changed. > found 513418 versions gnumeric/1.9.3-1 gnumeric/1.6.3-5.1+etch1 > gnumeric/1.8.3-5 Unknown command or malformed arguments to command. > fixed 513418 gnumeric/1.8.4-3 gnumeric/1.6.3-5.1+etch2 Unknown command or malformed arguments to command. > # Experimental (1.9.3-1) is still affected > tags 513418 + experimental Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Tags were: fixed-upstream patch upstream security Tags added: experimental > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Processed: Re: Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper
Processing commands for cont...@bugs.debian.org: > # The affected code is part of the python-loader plugin. > reassign 513418 gnumeric-plugins-extra Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Bug reassigned from package `gnumeric' to `gnumeric-plugins-extra'. > tags 513418 + upstream Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper Tags were: patch security Tags added: upstream > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper
# The affected code is part of the python-loader plugin. reassign 513418 gnumeric-plugins-extra tags 513418 + upstream thanks On Wed, Jan 28, 2009 at 22:59:25 +0100, Nico Golde wrote: > The attached patch should fix this problem (but I haven't > tested it). Going by http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251#26 this patch may not be sufficient. I'll try to get a hold of upstream to discuss this. Ray -- "The problem with the global village is all the global village idiots." Paul Ginsparg -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in GObject wrapper
Package: gnumeric Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for gnumeric. CVE-2009-0318[0]: | Untrusted search path vulnerability in the GObject Python interpreter | wrapper in Gnumeric allows local users to execute arbitrary code via a | Trojan horse Python file in the current working directory, related to | a vulnerability in the PySys_SetArgv function (CVE-2008-5983). The attached patch should fix this problem (but I haven't tested it). If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318 http://security-tracker.debian.net/tracker/CVE-2009-0318 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. --- gnm-py-interpreter.c 2008-01-18 21:28:20.0 +0100 +++ gnm-py-interpreter.c.new 2009-01-28 22:58:40.0 +0100 @@ -101,6 +101,7 @@ interpreter->plugin = plugin; PySys_SetArgv (G_N_ELEMENTS (plugin_argv) - 1, plugin_argv); + PyRun_SimpleString("import sys; sys.path = filter(None, sys.path)"); py_initgnumeric (interpreter); return interpreter; pgp64f0bsjnAQ.pgp Description: PGP signature