Bug 644933 (CVE-2010-3999)
Summary: | CVE-2010-3999 gnucash: insecure library loading vulnerability | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | info, notting, vkrizan |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-12-22 15:41:54 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 644934 | ||
Bug Blocks: |
Description
Vincent Danen
2010-10-20 16:08:25 UTC
Created gnucash tracking bugs for this issue Affects: fedora-all [bug 644934] Affects: fedora-all [bug 644934] Fixed in Fedora 13 and 14, and EPEL 4 and 5. I don't seem to remember any notice on the usual gnucash channels (bugzilla, mailing lists,...) regarding this issue. I have just stumbled upon this one here by accident. Just for your reference, I have committed a fix to the upstream gnucash source that will skip the unsafe file from installation altogether. As you say, it's only used by developers and packagers for running tests. I'm assuming this is the upstream fix? http://svn.gnucash.org/trac/changeset?old_path=%2Fgnucash%2Ftrunk&old=21552&new_path=%2Fgnucash%2Ftrunk&new=21553 Yes, that's the one. Perfect, thank you for the confirmation. |