Bug 140074 (CVE-2004-0967) - CVE-2004-0967 temporary file vulnerabilities in various ghostscript scripts.
Summary: CVE-2004-0967 temporary file vulnerabilities in various ghostscript scripts.
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2004-0967
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
low
Target Milestone: ---
Assignee: Tim Waugh
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-11-19 16:42 UTC by Josh Bressers
Modified: 2022-04-29 14:41 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-09-07 15:46:28 UTC
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2004-11-19 16:42:35 UTC
On September 10th 2004, Trustix shared some temporary file
vulnerabilities with vendor-sec.  After some refinement these were
made public on Sep30.  These are minor issues (impact: LOW) and
therefore should be fixed in future updates, but don't deserve their
own security advisory.

Temporary file vulnerability in espgs pj-gs.sh, ps2epsi, pv.sh,
sysvlp.sh scripts.  Patch attached.

See bug 136321 for addional information.

This bug is basically a tracking bug for the security team.

Comment 8 Josh Bressers 2007-09-07 15:46:28 UTC
This flaw has been rated as having a low severity by the Red Hat Security
Response Team.  More information about this rating can be found here:
http://www.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity
security risk. We therefore currently have no plans to fix this flaw in Red Hat
Enterprise Linux 2.1 which is in maintenance mode.

If you believe this judgement to be in error, please reopen this bug with an
appropriate comment.


Note You need to log in before you can comment on or make changes to this bug.