Bug 136318 - CAN-2004-0968 temporary file vulnerabilities in catchsegv script
CAN-2004-0968 temporary file vulnerabilities in catchsegv script
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: glibc (Show other bugs)
All Linux
medium Severity low
: ---
: ---
Assigned To: Jakub Jelinek
Brian Brock
: Security
Depends On:
  Show dependency treegraph
Reported: 2004-10-19 06:23 EDT by Mark J. Cox (Product Security)
Modified: 2007-11-30 17:07 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2004-12-20 13:14:19 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Proposed patch (5.83 KB, patch)
2004-10-19 06:24 EDT, Mark J. Cox (Product Security)
no flags Details | Diff

  None (edit)
Description Mark J. Cox (Product Security) 2004-10-19 06:23:56 EDT
On September 10th 2004, Trustix shared some temporary file
vulnerabilities with vendor-sec.  After some refinement these were
made public on Sep30.  These are minor issues (impact: LOW) and
therefore should be fixed in future updates, but don't deserve their
own security advisory.

Temporary file vulnerability in catchsegv.  Patch attached.

                Affects: RHEL2.1
                Probably Affects: RHEL3
Comment 1 Mark J. Cox (Product Security) 2004-10-19 06:24:38 EDT
Created attachment 105440 [details]
Proposed patch
Comment 2 Jakub Jelinek 2004-10-19 08:31:56 EDT
glibcbug script is gone from CVS glibc (for 9 months already),
I'll make sure it disappears from RHEL2.1 and RHEL3 too.
For catchsegv a different patch has been committed upstream,
the remaining changes are incorrect.
Comment 3 Jakub Jelinek 2004-10-22 13:16:47 EDT
glibcbug removed and catchsegv fixed in glibc-2.3.2-95.30.
Comment 4 Josh Bressers 2004-11-03 08:17:44 EST
This issue is going to be RHSA-2004:586
Comment 5 John Flanagan 2004-12-20 13:14:19 EST
An errata has been issued which should help the problem 
described in this bug report. This report is therefore being 
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, 
please follow the link below. You may reopen this bug report 
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.