Bugzilla – Bug 90339
VUL-0: CVE-2005-1686: gedit format string bug
Last modified: 2021-11-03 14:42:55 UTC
We received the following report via full-disclosure. The issue is public. Se also http://bugzilla.gnome.org/show_bug.cgi?id=306800 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159657 Is gedit associated with any filetype by default? Date: Thu, 9 Jun 2005 15:06:19 +0200 From: Martin Pitt <martin.pitt@canonical.com> To: ubuntu-security-announce@lists.ubuntu.com Cc: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com Subject: [Full-disclosure] [USN-138-1] gedit vulnerability =========================================================== Ubuntu Security Notice USN-138-1 June 09, 2005 gedit vulnerability CAN-2005-1686 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: gedit The problem can be corrected by upgrading the affected package to version 2.8.1-0ubuntu1.1 (for Ubuntu 4.10) and 2.10.2-0ubuntu2 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A format string vulnerability has been discovered in gedit. Calling the program with specially crafted file names caused a buffer overflow, which could be exploited to execute arbitrary code with the privileges of the gedit user. This becomes security relevant if e. g. your web browser is configued to open URLs in gedit. If you never open untrusted file names or URLs in gedit, this flaw does not affect you. Updated packages for Ubuntu 4.10 (Warty Warthog): Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gedit/gedit_2.8.1-0ubuntu1.1.diff.gz Size/MD5: 9414 605064f69529dfef55e811a14c482c44 http://security.ubuntu.com/ubuntu/pool/main/g/gedit/gedit_2.8.1-0ubuntu1.1.dsc Size/MD5: 1751 ef7f5d4ec7adf77d7fe0eca3df751456 http://security.ubuntu.com/ubuntu/pool/main/g/gedit/gedit_2.8.1.orig.tar.gz Size/MD5: 4082500 38447bcce215ddc90205e60deee1f49a [...]
Gedit is associated as default for text/plain. Package gedit fixed for: sles9-sld-all 9.1-all 9.2-all 9.3-all Package gedit2 fixed for: sles8-slec-all ul1-all 8.2-all 9.0-all For versions 2.10 and 2.8 patches from http://bugzilla.gnome.org/show_bug.cgi?id=306800 were used. For older released, parts of patch was backported. Package gedit updated for: stable-all plus Reassigning to security team. Please create patchinfos.
SM-Tracker-1557
updates approved
CVE-2005-1686: CVSS v2 Base Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)