First published: Mon Jan 26 2009(Updated: )
Untrusted search path vulnerability in gedit's Python module allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function. References: <a href="http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html">http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html</a> Debian bug report for similar eog issue: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504352#4">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504352#4</a> Proposed patch: Not sure, if gedi'ts upstream has been reported about this issue. The Debian patch for similar eog's Python related issue, available at: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=02_sanitize_sys.path.patch;att=1;bug=504352">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=02_sanitize_sys.path.patch;att=1;bug=504352</a> should be sufficient to resolve this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Text Editor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-481556 is classified as high due to the potential for arbitrary code execution by local users.
To fix REDHAT-BUG-481556, ensure that the gedit Python module is updated to a version that corrects the untrusted search path vulnerability.
Local users of the gedit text editor are affected by REDHAT-BUG-481556 if they can execute Python code.
No, REDHAT-BUG-481556 cannot be exploited remotely; it requires local access to the system.
Systems running vulnerable versions of gedit and allowing local user access are at risk from REDHAT-BUG-481556.