Package: nautilus-python Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for nautilus-python.
CVE-2009-0317[0]: | Untrusted search path vulnerability in the Python language bindings | for Nautilus (nautilus-python) allows local users to execute arbitrary | code via a Trojan horse Python file in the current working directory, | related to a vulnerability in the PySys_SetArgv function | (CVE-2008-5983). To fix this you need to patch src/nautilus-python.c in the same way as http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=CVE-2009-0318.patch;att=1;bug=513418 should be sufficient. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0317 http://security-tracker.debian.net/tracker/CVE-2009-0317 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgp0vzFWZl6OB.pgp
Description: PGP signature