USN-138-1: gedit vulnerability
9 June 2005
gedit vulnerability
Releases
Details
A format string vulnerability has been discovered in gedit. Calling
the program with specially crafted file names caused a buffer
overflow, which could be exploited to execute arbitrary code with the
privileges of the gedit user.
This becomes security relevant if e. g. your web browser is configued
to open URLs in gedit. If you never open untrusted file names or URLs
in gedit, this flaw does not affect you.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.04
-
gedit
-
Ubuntu 4.10
-
gedit
-
In general, a standard system update will make all the necessary changes.