exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-172

Mandriva Linux Security Advisory 2008-172
Posted Aug 16, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in Amarok prior to 1.4.10 would allow local users to overwrite arbitrary files via a symlink attack on a temporary file that Amarok created with a predictable name. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2008-3699
SHA-256 | 0d264688899d2167dbf887dabf91ffafa4e1aa4caa375f120055a0a33aaacc86

Mandriva Linux Security Advisory 2008-172

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:172
http://www.mandriva.com/security/
_______________________________________________________________________

Package : amarok
Date : August 15, 2008
Affected: 2008.0, 2008.1
_______________________________________________________________________

Problem Description:

A flaw in Amarok prior to 1.4.10 would allow local users to overwrite
arbitrary files via a symlink attack on a temporary file that Amarok
created with a predictable name (CVE-2008-3699).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
add9881887c5e33288947a836ea829f7 2008.0/i586/amarok-1.4.7-9.1mdv2008.0.i586.rpm
6cb1913a6bc874ea77a25d76521e39a8 2008.0/i586/amarok-engine-xine-1.4.7-9.1mdv2008.0.i586.rpm
66b1e073cc975872fb15e1d674462d6e 2008.0/i586/amarok-scripts-1.4.7-9.1mdv2008.0.i586.rpm
9decca6e5825541b00c7942340308065 2008.0/i586/libamarok0-1.4.7-9.1mdv2008.0.i586.rpm
f52da39d55c1ad5a475e14a7f4a42d11 2008.0/i586/libamarok0-scripts-1.4.7-9.1mdv2008.0.i586.rpm
130e958096e23249244e7e2ff02aa1f6 2008.0/i586/libamarok-devel-1.4.7-9.1mdv2008.0.i586.rpm
8d5dd406aa2cb0a56e922f8ff7d9ea34 2008.0/i586/libamarok-scripts-devel-1.4.7-9.1mdv2008.0.i586.rpm
36da208a1bb60169c8b721bfc9d38f15 2008.0/SRPMS/amarok-1.4.7-9.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
c01e9b41a520a3a65398866daca707cf 2008.0/x86_64/amarok-1.4.7-9.1mdv2008.0.x86_64.rpm
b300777e4a9db10814ba3a920ce690d0 2008.0/x86_64/amarok-engine-xine-1.4.7-9.1mdv2008.0.x86_64.rpm
c24609bda65290240c8689b2863de9cb 2008.0/x86_64/amarok-scripts-1.4.7-9.1mdv2008.0.x86_64.rpm
eb04320a5d103aef042f29ed9731ac8b 2008.0/x86_64/lib64amarok0-1.4.7-9.1mdv2008.0.x86_64.rpm
c71f5eda86c58ad9bd78bebc06b63f01 2008.0/x86_64/lib64amarok0-scripts-1.4.7-9.1mdv2008.0.x86_64.rpm
df9206ff03dad2f1b2e3ce40e1cc190d 2008.0/x86_64/lib64amarok-devel-1.4.7-9.1mdv2008.0.x86_64.rpm
a9a45984a13f545e828c957e98ca2051 2008.0/x86_64/lib64amarok-scripts-devel-1.4.7-9.1mdv2008.0.x86_64.rpm
36da208a1bb60169c8b721bfc9d38f15 2008.0/SRPMS/amarok-1.4.7-9.1mdv2008.0.src.rpm

Mandriva Linux 2008.1:
35bb66001f0a6efb796d476b1ba35098 2008.1/i586/amarok-1.4.8-12.1mdv2008.1.i586.rpm
39f5f1cba6d2a2dd347e2004eb37b6b6 2008.1/i586/amarok-engine-void-1.4.8-12.1mdv2008.1.i586.rpm
b54d096ed180078cc0adbf13ee9c1234 2008.1/i586/amarok-engine-xine-1.4.8-12.1mdv2008.1.i586.rpm
c47c5274f6419497e83b9d9e129f0cee 2008.1/i586/amarok-engine-yauap-1.4.8-12.1mdv2008.1.i586.rpm
f710c717a6bb71e445671688edca63c7 2008.1/i586/amarok-scripts-1.4.8-12.1mdv2008.1.i586.rpm
d07c5193757104a086c798bd4acfa1ff 2008.1/i586/libamarok0-1.4.8-12.1mdv2008.1.i586.rpm
0886969d0cf8a00a24ec3767f7e26d52 2008.1/i586/libamarok0-scripts-1.4.8-12.1mdv2008.1.i586.rpm
b448749b86d31cce3fe37803a6d76955 2008.1/i586/libamarok-devel-1.4.8-12.1mdv2008.1.i586.rpm
00b6a0c87044ad127837dd6b0eaaaf05 2008.1/i586/libamarok-scripts-devel-1.4.8-12.1mdv2008.1.i586.rpm
d98786eee09881cdaa238f00e29e7c48 2008.1/SRPMS/amarok-1.4.8-12.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
4c90ca190be22b80aa57df40a054fb22 2008.1/x86_64/amarok-1.4.8-12.1mdv2008.1.x86_64.rpm
1a3c01858fcfbd321f65b8140252fa3e 2008.1/x86_64/amarok-engine-void-1.4.8-12.1mdv2008.1.x86_64.rpm
d62f9425e5917415066c16f170b9f079 2008.1/x86_64/amarok-engine-xine-1.4.8-12.1mdv2008.1.x86_64.rpm
d4ff899bf669f9f676df2e6b809f2fc8 2008.1/x86_64/amarok-engine-yauap-1.4.8-12.1mdv2008.1.x86_64.rpm
35a26a4ee0d82eaa8e52436dcf1bfaa9 2008.1/x86_64/amarok-scripts-1.4.8-12.1mdv2008.1.x86_64.rpm
9738454dec262ef9d19c93e7e78328c8 2008.1/x86_64/lib64amarok0-1.4.8-12.1mdv2008.1.x86_64.rpm
93414b3bd1d5b12a6cdb8fc48091785b 2008.1/x86_64/lib64amarok0-scripts-1.4.8-12.1mdv2008.1.x86_64.rpm
a11bccff3c601e5d2f3a8501c72e709f 2008.1/x86_64/lib64amarok-devel-1.4.8-12.1mdv2008.1.x86_64.rpm
ec100b8483103dc815b52b3f546df167 2008.1/x86_64/lib64amarok-scripts-devel-1.4.8-12.1mdv2008.1.x86_64.rpm
d98786eee09881cdaa238f00e29e7c48 2008.1/SRPMS/amarok-1.4.8-12.1mdv2008.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIpc66mqjQ0CJFipgRAs8UAJ9zaZ2Q2gNIZIH2QjEkb24qy/p75wCfdjI9
6ws9cZQ3VJO2BMZpRcO+NGY=
=uJ0s
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close