Bug 136318
| Summary: | CAN-2004-0968 temporary file vulnerabilities in catchsegv script | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 3 | Reporter: | Mark J. Cox <mjc> | ||||
| Component: | glibc | Assignee: | Jakub Jelinek <jakub> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> | ||||
| Severity: | low | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 3.0 | CC: | fweimer | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | impact=low,public=20040930,reported=20040910,source=vendorsec | ||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2004-12-20 18:14:19 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
Created attachment 105440 [details]
Proposed patch
glibcbug script is gone from CVS glibc (for 9 months already), I'll make sure it disappears from RHEL2.1 and RHEL3 too. For catchsegv a different patch has been committed upstream, the remaining changes are incorrect. glibcbug removed and catchsegv fixed in glibc-2.3.2-95.30. This issue is going to be RHSA-2004:586 An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-586.html |
On September 10th 2004, Trustix shared some temporary file vulnerabilities with vendor-sec. After some refinement these were made public on Sep30. These are minor issues (impact: LOW) and therefore should be fixed in future updates, but don't deserve their own security advisory. Temporary file vulnerability in catchsegv. Patch attached. Affects: RHEL2.1 Probably Affects: RHEL3