Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A temporary file vulnerability exists in NEdit, the Nirvana Editor.
When printing the entire text or selected parts of the text within the
editor, nedit creates a temporary file in an insecure manner. This
could be exploited to gain access to other user privileges including
root.
Updated Packages |
Mandrakelinux 7.1
4f97d5ed0100ee9a38961d19e189f1cb 7.1/RPMS/nedit-5.1.1-9.2mdk.i586.rpm 116f0b623fc9a9d56369a5e00aabd596 7.1/SRPMS/nedit-5.1.1-9.2mdk.src.rpm
Mandrakelinux 7.2
aa30f2bd203db8f50cf59b0a2b6939fd 7.2/RPMS/nedit-5.1.1-9.1mdk.i586.rpm 9ab4ccb9d28da67bf360de6f0e0acea7 7.2/SRPMS/nedit-5.1.1-9.1mdk.src.rpm
Mandrakelinux 8.0
a6e536fabf777e8068c1eb92e963a85e 8.0/RPMS/nedit-5.1.1-13.1mdk.i586.rpm 47fa2927a8b66c32661aaadcf7aa3ca4 8.0/SRPMS/nedit-5.1.1-13.1mdk.src.rpm
Corporate Server 1.0.1
4f97d5ed0100ee9a38961d19e189f1cb 1.0.1/RPMS/nedit-5.1.1-9.2mdk.i586.rpm 116f0b623fc9a9d56369a5e00aabd596 1.0.1/SRPMS/nedit-5.1.1-9.2mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.