Joined: 12 May 2004
|Posted: Wed Feb 05, 2014 12:34 pm Post subject: [ GLSA 201402-05 ] Banshee: Arbitrary code execution
|Gentoo Linux Security Advisory
Title: Banshee: Arbitrary code execution (GLSA 201402-05)
Date: February 05, 2014
An environment variable processing error has been reported in
Banshee, possibly allowing local attacker to load a specially crafted
Banshee is a multimedia management and playback application for GNOME.
Vulnerable: < 1.8.0-r1
Unaffected: >= 1.8.0-r1
Architectures: All supported architectures
Banshee places a zero-length directory name in PATH, which allows
libraries to be loaded from the working directory.
A local attacker could put specially crafted library into working
directory of Banshee, possibly resulting in execution of arbitrary code
with the privileges of the process, or a Denial of Service condition.
There is no known workaround at this time.
All Banshee users should upgrade to the latest version:
NOTE: This is a legacy GLSA. Updates for all affected architectures are
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/banshee-1.8.0-r1"
available since November 17, 2010. It is likely that your system is
already no longer affected by this issue.