USN-1503-1: Rhythmbox vulnerability

Publication date

11 July 2012

Overview

Rhythmbox could be made to run programs as your login when using the Context plugin.


Packages

  • rhythmbox - music player and organizer for GNOME

Details

Hans Spaans discovered that the Context plugin in Rhythmbox created a
temporary directory in an insecure manner. A local attacker could exploit
this to execute arbitrary code as the user invoking the program. The
Context plugin is disabled by default in Ubuntu.

Hans Spaans discovered that the Context plugin in Rhythmbox created a
temporary directory in an insecure manner. A local attacker could exploit
this to execute arbitrary code as the user invoking the program. The
Context plugin is disabled by default in Ubuntu.

Update instructions

After a standard system update you need to restart Rhythmbox to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
12.04 precise rhythmbox-plugins –  2.96-0ubuntu4.1
11.10 oneiric rhythmbox-plugins –  2.90.1~20110908-0ubuntu1.4

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›