Gentoo Linux Security Advisory GLSA 200903-16 - An untrusted search path vulnerability in Epiphany might result in the execution of arbitrary code. James Vega reported an untrusted search path vulnerability in the Python interface. Versions less than 2.22.3-r2 are affected.
f8e7162ba670b96296d096765bbcc2aef7e695b25dda8955f0b94fb293566640
Mandriva Linux Security Advisory 2009-048-2 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability. The previous update package was not built against the correct (latest) libxulrunner-1.9.0.6 library (fixes #48163)
b032696b04660af22c37e518a131132cba8eb6c58825fe4808fe2fa0e0faa622
Mandriva Linux Security Advisory 2009-048-1 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability. The previous update package was not built against the correct (latest) libxulrunner-1.9.0.6 library (fixes #48163)
8f10e474b35d037306a6f4098b2632f5760950215e3ed5ab286da21879ce1b2d
Mandriva Linux Security Advisory 2009-048 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability.
7883f5f009d8458c54ce4ec7f8395c1a8adb8400a8af7050d52c046bfe3e2530