An untrusted search path vulnerability in the Eye of GNOME might result in the execution of arbitrary code.
Package | media-gfx/eog on all architectures |
---|---|
Affected versions | < 2.22.3-r3 |
Unaffected versions | >= 2.22.3-r3 |
The Eye of GNOME is the official image viewer for the GNOME Desktop environment.
James Vega reported an untrusted search path vulnerability in the GObject Python interpreter wrapper in the Eye of GNOME, a vulnerabiliy related to CVE-2008-5983.
A local attacker could entice a user to run the Eye of GNOME from a directory containing a specially crafted python module, resulting in the execution of arbitrary code with the privileges of the user running the application.
Do not run "eog" from untrusted working directories.
All Eye of GNOME users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-gfx/eog-2.22.3-r3"
Release date
April 06, 2009
Latest revision
April 06, 2009: 01
Severity
normal
Exploitable
local
Bugzilla entries