From $URL: The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.
+*tomboy-1.4.2-r1 (26 Feb 2011) + + 26 Feb 2011; Pacho Ramos <pacho@gentoo.org> +tomboy-1.4.2-r1.ebuild, + +files/tomboy-1.4.2-insecure-path.patch: + Fix tomboy insecure LD_LIBRARY_PATH (CVE-2010-4005). + I am ok with CCing arches as soon as you need
Thank you. Arches, please stabilize =app-misc/tomboy-1.4.2-r1
amd64 ok
amd64 done. Thanks Agostino
x86 stable
ppc stable
Thanks, everyone. GLSA request filed.
CVE-2010-4005 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005): The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.
Vulnerable versions were dropped long time ago
This one is fixed as it seems.
This issue was resolved and addressed in GLSA 201401-28 at http://security.gentoo.org/glsa/glsa-201401-28.xml by GLSA coordinator Sean Amoss (ackle).