Mandrake Security Advisory MDVSA-2009:245 (glib2.0)

Summary
The remote host is missing an update to glib2.0 announced via advisory MDVSA-2009:245.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:245
Insight
A vulnerability was discovered and corrected in glib2.0: The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory (CVE-2009-3289). This update provides a solution to this vulnerability. Affected: 2008.1, 2009.0, 2009.1, Enterprise Server 5.0