Gentoo Logo

Banshee: Arbitrary code execution


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201402-05 / banshee
Release Date February 05, 2014
Latest Revision February 05, 2014: 1
Impact low
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
media-sound/banshee < 1.8.0-r1 >= 1.8.0-r1 All supported architectures

Related bugreports: #345567


An environment variable processing error has been reported in Banshee, possibly allowing local attacker to load a specially crafted shared library.

2.  Impact Information


Banshee is a multimedia management and playback application for GNOME.


Banshee places a zero-length directory name in PATH, which allows libraries to be loaded from the working directory.


A local attacker could put specially crafted library into working directory of Banshee, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

3.  Resolution Information


There is no known workaround at this time.


All Banshee users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-sound/banshee-1.8.0-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 17, 2010. It is likely that your system is already no longer affected by this issue.

4.  References


Page updated February 05, 2014

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.