Summary: | CVE-2012-3355 rhythmbox (context plug-in): Insecure temporary directory use by loading template files for 'Album', 'Lyrics', and 'Artist' tabs | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bnocera, henri, jrusnack |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-06-10 21:45:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 835080 | ||
Bug Blocks: | 835082 |
Description
Jan Lieskovsky
2012-06-25 13:30:40 UTC
This issue did NOT affect the version of the rhythmbox package, as shipped with Red Hat Enterprise Linux 5, as it did NOT include the context plug-in yet. -- This issue affects the version of the rhythmbox package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the rhythmbox package, as shipped with Fedora release of 16 and 17. Please schedule an update. CVE Request: [3] http://www.openwall.com/lists/oss-security/2012/06/25/5 Created rhythmbox tracking bugs for this issue Affects: fedora-all [bug 835080] Added CVE as per http://www.openwall.com/lists/oss-security/2012/06/25/7 Statement: This issue does not affect the version of rhythmbox as shipped with Red Hat Enterprise Linux 5. This issue affects the version of rhythmbox as shipped with Red Hat Enterprise Linux 6. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. |