Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A vulnerability exists with tcsh when using the in-here documents with
the << syntax. When doing this, tcsh uses a temporary file to store
the data. Unfortunately, the temporary file is not created securely
and standard symlink attacks can be used to make tcsh overwrite
arbitrary files.
Updated Packages |
Mandrakelinux 6.0
1870a7480af74a09d3fbcb743be4d68b 6.0/RPMS/tcsh-6.09.04-1.2mdk.i586.rpm 4137396e407c173227ee4cefb35bbb89 6.0/SRPMS/tcsh-6.09.04-1.2mdk.src.rpm
Mandrakelinux 6.1
c6a888050c151bb8caf9f9e448e6a99d 6.1/RPMS/tcsh-6.09.04-1.2mdk.i586.rpm 4137396e407c173227ee4cefb35bbb89 6.1/SRPMS/tcsh-6.09.04-1.2mdk.src.rpm
Mandrakelinux 7.0
b2ff9906f77f4f8f738f85aedcd6d1ce 7.0/RPMS/tcsh-6.09.04-1.2mdk.i586.rpm 4137396e407c173227ee4cefb35bbb89 7.0/SRPMS/tcsh-6.09.04-1.2mdk.src.rpm
Mandrakelinux 7.1
8e917a65861dd246f2a55786415395f5 7.1/RPMS/tcsh-6.09.04-1.2mdk.i586.rpm 4137396e407c173227ee4cefb35bbb89 7.1/SRPMS/tcsh-6.09.04-1.2mdk.src.rpm
Mandrakelinux 7.2
14284cbb343a88bcceca0fff6a0e6416 7.2/RPMS/tcsh-6.09.04-1.1mdk.i586.rpm 190fbcfe6c8329274290445add4c3065 7.2/SRPMS/tcsh-6.09.04-1.1mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.