Home > Security > Advisories

Advisories

Mandriva Advisories

Package name pine
Date May 7th, 2001
Advisory ID MDKSA-2001:047
Affected versions 7.1, 7.2, 8.0, CS1.0
Synopsis Updated pine packages fix temporary file vulnerabilities

Problem Description

Versions of the Pine email client prior to 4.33 have various temporary
file creation problems, as does the pico editor. These issues allow
any user with local system access to cause any files owned by any
other user, including root, to potentially be overwritten if the
conditions were right.

Updated Packages

Mandrakelinux 7.1

 d91b1f63e60dfdf1602ffbe53a955efe  7.1/RPMS/pine-4.33-1.2mdk.i586.rpm
2d2590d427a89fc5c7b43beef1e32cf8  7.1/SRPMS/pine-4.33-1.2mdk.src.rpm

Mandrakelinux 7.2

 ef84533d82a85006e9dbfc02f440de0c  7.2/RPMS/pine-4.33-1.1mdk.i586.rpm
bcfef9f61fcd897394701983cc590f96  7.2/SRPMS/pine-4.33-1.1mdk.src.rpm

Mandrakelinux 8.0

 d40ef2433d1779a1a1d3571542002db9  8.0/RPMS/pine-4.33-1.1mdk.i586.rpm
bcfef9f61fcd897394701983cc590f96  8.0/SRPMS/pine-4.33-1.1mdk.src.rpm

Corporate Server 1.0.1

 d91b1f63e60dfdf1602ffbe53a955efe  1.0.1/RPMS/pine-4.33-1.2mdk.i586.rpm
2d2590d427a89fc5c7b43beef1e32cf8  1.0.1/SRPMS/pine-4.33-1.2mdk.src.rpm

References

http://www.cups.org/relnotes.html#01010700

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.