[Bug 1452050] New: CVE-2016-10374 perltidy: Uses current working directory without symlink-attack protection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1452050

            Bug ID: 1452050
           Summary: CVE-2016-10374 perltidy: Uses current working
                    directory without symlink-attack protection
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-team@xxxxxxxxxx
          Reporter: anemec@xxxxxxxxxx
                CC: jplesnik@xxxxxxxxxx, paul@xxxxxxxxxxxx,
                    perl-devel@xxxxxxxxxxxxxxxxxxxxxxx,
                    perl-maint-list@xxxxxxxxxx, ppisar@xxxxxxxxxx,
                    psabata@xxxxxxxxxx




perltidy relies on the current working directory for certain output files and
does not have a symlink-attack protection mechanism, which allows local users
to overwrite arbitrary files by creating a symlink, as demonstrated by creating
a perltidy.ERR symlink that the victim cannot delete.

References:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862667

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux