CVE-2009-0318 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0318): Untrusted search path vulnerability in the GObject Python interpreter wrapper in Gnumeric allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
I am not sure whether this bug is being tracked upstream. Please see the blocker for details and a patch example.
ping
Commited as 1.8.4-r1. Sorry for taking so long.
Arches, please test and mark stable: =app-office/gnumeric-1.8.4-r1 Target keywords : "alpha amd64 hppa ia64 ppc ppc64 sparc x86"
Sparc stable for gnumeric-1.8.4-r1. Note that this does not match the summary.
(In reply to comment #5) > Sparc stable for gnumeric-1.8.4-r1. Note that this does not match the summary. > Ah, I see the summary was updated. Ignore the comments.
ppc64 done
Stable on alpha.
!!! dodoc: TODO does not exist >>> Completed installing gnumeric-1.8.4-r1 into /var/tmp/portage/app-office/gnumeric-1.8.4-r1/image/
amd64/x86 stable
ia64 stable
ppc done
Stable for HPPA.
GLSA 200904-03