Bug 177407 - f-spot wrapper script looks for executable in CWD
f-spot wrapper script looks for executable in CWD
Product: Fedora
Classification: Fedora
Component: f-spot (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Christopher Aillon
: Security
: 177676 (view as bug list)
Depends On:
Blocks: FC5Target
  Show dependency treegraph
Reported: 2006-01-10 08:26 EST by Oskari Saarenmaa
Modified: 2007-11-30 17:11 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-02-01 12:43:39 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
GNOME Desktop 328909 None None None Never

  None (edit)
Description Oskari Saarenmaa 2006-01-10 08:26:42 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.8) Gecko/20051216 Fedora/1.5-3 Firefox/1.5

Description of problem:
The f-spot wrapper script in /usr/bin attempts to run f-spot.exe from the current working directory.  This can lead into problems when launching f-spot from for example /tmp where another user might have created a fake f-spot.exe file.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1. cd /tmp
2. touch f-spot.exe Makefile Defines.cs
3. f-spot

Actual Results:  *** Running uninstalled f-spot ***
cannot open assembly ./f-spot.exe

Additional info:
Comment 1 Bill Nottingham 2006-01-12 15:40:00 EST
*** Bug 177676 has been marked as a duplicate of this bug. ***
Comment 2 Christopher Aillon 2006-01-27 18:26:55 EST
This has been filed as http://bugzilla.gnome.org/show_bug.cgi?id=328909
Comment 3 Bill Nottingham 2006-01-30 13:16:18 EST
Flipping security flag, as this is a security issue...
Comment 4 Christopher Aillon 2006-02-01 12:43:39 EST
should be fixed in rawhide, now.

Note You need to log in before you can comment on or make changes to this bug.