An insecure temporary directory use flaw was found in the way Rhythmbox, an integrated music management application based on the powerful GStreamer media framework, performed loading of HTML template files, used for rendering of 'Album', 'Lyrics', and 'Artist' tabs. Previously the '/tmp/context' directory has been searched as module directory when loading the HTML template files. A local attacker could use this flaw to conduct symbolic link attacks (possibly leading to attacker's ability to execute arbitrary HTML template file in the context of user running the rhythmbox executable). Upstream bug report: [1] https://bugzilla.gnome.org/show_bug.cgi?id=678661 References: [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673
This issue did NOT affect the version of the rhythmbox package, as shipped with Red Hat Enterprise Linux 5, as it did NOT include the context plug-in yet. -- This issue affects the version of the rhythmbox package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the rhythmbox package, as shipped with Fedora release of 16 and 17. Please schedule an update.
CVE Request: [3] http://www.openwall.com/lists/oss-security/2012/06/25/5
Created rhythmbox tracking bugs for this issue Affects: fedora-all [bug 835080]
Added CVE as per http://www.openwall.com/lists/oss-security/2012/06/25/7
Statement: This issue does not affect the version of rhythmbox as shipped with Red Hat Enterprise Linux 5. This issue affects the version of rhythmbox as shipped with Red Hat Enterprise Linux 6. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.