Gentoo Logo

Tomboy: User-assisted execution of arbitrary code


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200711-12 / tomboy
Release Date November 08, 2007
Latest Revision November 08, 2007: 01
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
app-misc/tomboy < 0.8.1-r1 >= 0.8.1-r1 All supported architectures

Related bugreports: #189249


Tomboy doesn't properly handle environment variables, potentially allowing a local attacker to execute arbitrary code.

2.  Impact Information


Tomboy is a GTK-based desktop note-taking application written in C# and the Mono C#.


Jan Oravec reported that the "/usr/bin/tomboy" script sets the "LD_LIBRARY_PATH" environment variable incorrectly, which might result in the current working directory (.) to be included when searching for dynamically linked libraries of the Mono Runtime application.


A local attacker could entice a user into running Tomboy in a directory containing a specially crafted library file to execute arbitrary code with the privileges of the user running Tomboy.

3.  Resolution Information


Do not run Tomboy from an untrusted working directory.


All Tomboy users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-misc/tomboy-0.8.1-r1"

4.  References


Page updated November 08, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.