From the original Debian bug at http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598289: During a review of the Debian archive, I've found your package to contain a script that can be abused by an attacker to execute arbitrary code. The vulnerability is introduced by an insecure change to LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for libraries on a directory other than the standard paths. Vulnerable code follows: /usr/bin/gnome-subtitles line 9: export LD_LIBRARY_PATH="$libdir/gnome-subtitles:$LD_LIBRARY_PATH" When there's an empty item on the colon-separated list of LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.) If the given script is executed from a directory where a potential, local, attacker can write files to, there's a chance to exploit this bug. This vulnerability has been assigned the CVE id CVE-2010-3357. Please make sure you mention it when forwarding this report to upstream and when fixing this bug (everywhere: upstream and here at Debian.) [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3357 [1] http://security-tracker.debian.org/tracker/CVE-2010-3357
CVE-2010-3357 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3357): gnome-subtitles 1.0 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
gnome-subtitles-1.1 and 1.2 are in tree and NVD indicates that only 1.0 is affected. Ancient bug, closing noglsa.