Description(1), (2), (3), and (4) in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs616673

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rhythmbox (PTS)buster3.4.3-2fixed
bookworm, sid3.4.6-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[squeeze] - rhythmbox <no-dsa> (Minor issue)
Upstream bug report

Search for package or bug name: Reporting problems