Felipe Sateler discovered that apt-listchanges, a package change history notification tool, used unsafe paths when importing its python libraries. This could allow the execution of arbitrary shell commands if the root user executed the command in a directory which other local users may write to. For the old stable distribution (sarge), this problem was not present. For the stable distribution (etch), this problem has been fixed in version 2.72.5etch1. For the unstable distribution (sid), this problem has been fixed in version 2.82. We recommend that you upgrade your apt-listchanges package.
Felipe Sateler discovered that apt-listchanges, a package change history notification tool, used unsafe paths when importing its python libraries. This could allow the execution of arbitrary shell commands if the root user executed the command in a directory which other local users may write to.
For the old stable distribution (sarge), this problem was not present.
For the stable distribution (etch), this problem has been fixed in version 2.72.5etch4.
For the unstable distribution (sid), this problem has been fixed in version 2.82.
We recommend that you upgrade your apt-listchanges package.
MD5 checksums of the listed files are available in the original advisory.