Bug 168737
| Summary: | CAN-2005-2968 Mozilla improper command line URL sanitization | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 4 | Reporter: | Josh Bressers <bressers> |
| Component: | mozilla | Assignee: | Christopher Aillon <caillon> |
| Status: | CLOSED NOTABUG | QA Contact: | Ben Levenson <benl> |
| Severity: | high | Docs Contact: | |
| Priority: | medium | ||
| Version: | 4.0 | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | impact=important,public=20050906,reported=20050913,source=xchat | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2005-09-22 12:35:41 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Josh Bressers
2005-09-19 21:45:51 UTC
This issue should also affect RHEL2.1 and RHEL3 Note this is rated important not critical - a user would have to be tricked into clicking on a link in an external application that contains the backtick characters. After investigating the shell scripts Red Hat ships, we have determined that our Mozilla pakcages are not vulnerable to this issue. |