Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Jun 2012 15:36:57 +0200
From: Jan Lieskovsky <>
To: "Steven M. Christey" <>
CC:, Hans Spaans <>,
        Josselin Mouette <>,
        Bastien Nocera <>
Subject: CVE 2011-* Request -- rhythmbox (context plug-in): Insecure temporary
 directory use by loading template files for 'Album', 'Lyrics', and 'Artist'

Hello Kurt, Steve, vendors,

   An insecure temporary directory use flaw was found in the way Rhythmbox, an integrated music 
management application based on the powerful GStreamer media framework, performed loading of HTML 
template files, used for rendering of 'Album', 'Lyrics', and 'Artist' tabs. Previously the 
'/tmp/context' directory has been searched as module directory when loading the HTML template files. 
A local attacker could use this flaw to conduct symbolic link attacks (possibly leading to 
attacker's ability to execute arbitrary HTML template file in the context of user running the 
rhythmbox executable).

Upstream bug report:


Please note the [2] bug has been reported / opened on:
"Date: Sun, 06 Mar 2011 14:58:46 +0100" yet, so this should
get a CVE-2011-* identifier. Could you allocate one?

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.