Bug 144695 - CAN-2005-0069 vim unsafe temporary file usage.
Summary: CAN-2005-0069 vim unsafe temporary file usage.
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: vim   
(Show other bugs)
Version: 3.0
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Josh Bressers
QA Contact: David Lawrence
Whiteboard: impact=low,public=20050109
Keywords: Security
Depends On:
TreeView+ depends on / blocked
Reported: 2005-01-10 19:10 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2005-02-18 15:22:25 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2005:122 low SHIPPED_LIVE Low: vim security update 2005-02-18 05:00:00 UTC

Description Josh Bressers 2005-01-10 19:10:15 UTC
Two insecure temporary file vulns have been reported to the debian BTS.

The issues refer to the usage of temporary files using the process PID as the
"randomness".  I would not be surprised if this isn't the only scripts in vim
that do this.

Comment 1 Josh Bressers 2005-01-10 19:13:04 UTC
This issue should also affect RHEL2.1

Comment 4 Karsten Hopp 2005-01-11 13:23:42 UTC
vim-6.3.046-0.30E.2 is the fixed version for RHEL-3
vim-6.3.046-0.40E.2       "  "               RHEL-4
vim-6.0-7.20              "  "               AS-2.1

Comment 6 Josh Bressers 2005-02-18 15:22:25 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.