Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Jun 2012 15:43:33 +0200
From: Jan Lieskovsky <>
CC: "Steven M. Christey" <>,
        Hans Spaans <>, Josselin Mouette <>,
        Bastien Nocera <>
Subject: Re: CVE 2011-* Request -- rhythmbox (context plug-in):
 Insecure temporary directory use by loading template files for 'Album', 'Lyrics',
 and 'Artist' tabs

On 06/25/2012 03:36 PM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> An insecure temporary directory use flaw was found in the way Rhythmbox, an integrated music
> management application based on the powerful GStreamer media framework, performed loading of HTML
> template files, used for rendering of 'Album', 'Lyrics', and 'Artist' tabs. Previously the
> '/tmp/context' directory has been searched as module directory when loading the HTML template files.
> A local attacker could use this flaw to conduct symbolic link attacks (possibly leading to
> attacker's ability to execute arbitrary HTML template file in the context of user running the
> rhythmbox executable).
> Upstream bug report:
> [1]
> References:
> [2]
> [3]
> Please note the [2] bug has been reported / opened on:
> "Date: Sun, 06 Mar 2011 14:58:46 +0100" yet, so this should
> get a CVE-2011-* identifier. Could you allocate one?

Replying to myself, since I forgot to mention this in the
previous post -- it doesn't look this has get a CVE identifier

so please allocate one.

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.