gedit: Untrusted search path A vulnerability in gedit might allow local attackers to execute arbitrary code. gedit 2009-03-30 2009-03-30 257004 local 2.22.3-r1 2.24.3 2.24.3

gedit is a text editor for the GNOME desktop.

James Vega reported that gedit uses the current working directory when searching for python modules, a vulnerability related to CVE-2008-5983.

A local attacker could entice a user to open gedit from a specially crafted environment, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.

Do not run gedit from untrusted working directories.

All gedit 2.22.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.22.3-r1"

All gedit 2.24.x users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.24.3"
CVE-2008-5983 CVE-2009-0314 a3li p-y p-y