Processing commands for cont...@bugs.debian.org:
> found 513418 1.6.3-5.1+etch1
Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in
GObject wrapper
Bug marked as found in version 1.6.3-5.1+etch1.
> fixed 513418 1.6.3-5.1+etch2
Bug#513418: gnumeric: CVE-2009-0318 unt
Processing commands for cont...@bugs.debian.org:
> reopen 513418
Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in
GObject wrapper
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed
Processing commands for cont...@bugs.debian.org:
> # The affected code is part of the python-loader plugin.
> reassign 513418 gnumeric-plugins-extra
Bug#513418: gnumeric: CVE-2009-0318 untrusted search path vulnerability in
GObject wrapper
Bug reassigned from package `gnumeric' t
# The affected code is part of the python-loader plugin.
reassign 513418 gnumeric-plugins-extra
tags 513418 + upstream
thanks
On Wed, Jan 28, 2009 at 22:59:25 +0100, Nico Golde wrote:
> The attached patch should fix this problem (but I haven't
> tested it).
Going by http://bugs.debian.org/cgi-bi
Package: gnumeric
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gnumeric.
CVE-2009-0318[0]:
| Untrusted search path vulnerability in the GObject Python interpreter
| wrapper in Gnumeric allows local users to execute arbitrary
5 matches
Mail list logo