https://bugzilla.redhat.com/show_bug.cgi?id=1452050

            Bug ID: 1452050
           Summary: CVE-2016-10374 perltidy: Uses current working
                    directory without symlink-attack protection
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: ane...@redhat.com
                CC: jples...@redhat.com, p...@city-fan.org,
                    perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    psab...@redhat.com




perltidy relies on the current working directory for certain output files and
does not have a symlink-attack protection mechanism, which allows local users
to overwrite arbitrary files by creating a symlink, as demonstrated by creating
a perltidy.ERR symlink that the victim cannot delete.

References:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862667

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org

Reply via email to