|
![]() |
Problem Description |
A flaw in how tomboy handles LD_LIBRARY_PATH was discovered where by
appending paths to LD_LIBRARY_PATH the program would also search the
current directory for shared libraries. In directories containing
network data, those libraries could be injected into the application.
The updated packages have been patched to correct this issue.
Updated Packages |
Mandriva Linux 2007.1
e4fec795476776d6cdeb2b875dde8c17 2007.1/i586/tomboy-0.6.1-3.1mdv2007.1.i586.rpm b3f45b1dfc59d49c770529b1d2458c61 2007.1/SRPMS/tomboy-0.6.1-3.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64
a73e1c14a26e577b6306b70ff2084e74 2007.1/x86_64/tomboy-0.6.1-3.1mdv2007.1.x86_64.rpm b3f45b1dfc59d49c770529b1d2458c61 2007.1/SRPMS/tomboy-0.6.1-3.1mdv2007.1.src.rpm
Mandriva Linux 2008.0
e200a429f743429bfd741ce9f8c71152 2008.0/i586/tomboy-0.8.0-1.1mdv2008.0.i586.rpm 54b18c82a1f0037a94c394a0203cb3bc 2008.0/SRPMS/tomboy-0.8.0-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64
6698979ccf4f777c5111794f63a82604 2008.0/x86_64/tomboy-0.8.0-1.1mdv2008.0.x86_64.rpm 54b18c82a1f0037a94c394a0203cb3bc 2008.0/SRPMS/tomboy-0.8.0-1.1mdv2008.0.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.