Package: gnumeric
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gnumeric.

CVE-2009-0318[0]:
| Untrusted search path vulnerability in the GObject Python interpreter
| wrapper in Gnumeric allows local users to execute arbitrary code via a
| Trojan horse Python file in the current working directory, related to
| a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

The attached patch should fix this problem (but I haven't 
tested it).

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318
    http://security-tracker.debian.net/tracker/CVE-2009-0318

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
--- gnm-py-interpreter.c	2008-01-18 21:28:20.000000000 +0100
+++ gnm-py-interpreter.c.new	2009-01-28 22:58:40.000000000 +0100
@@ -101,6 +101,7 @@
 	interpreter->plugin = plugin;
 
 	PySys_SetArgv (G_N_ELEMENTS (plugin_argv) - 1, plugin_argv);
+	PyRun_SimpleString("import sys; sys.path = filter(None, sys.path)");
 	py_initgnumeric (interpreter);
 
 	return interpreter;

Attachment: pgp64f0bsjnAQ.pgp
Description: PGP signature

Reply via email to