Bugzilla – Bug 862743
VUL-1: CVE-2014-1875: perl-Capture-Tiny: insecure temporary file usage
Last modified: 2016-11-03 21:37:04 UTC
CVE-2014-1875: It was found that the Capture::Tiny module, provided by the perl-Capture-Tiny package, used the File::temp::tmpnam module to generate temporary files: ./lib/Capture/Tiny.pm: $stash->{flag_files}{$which} = scalar tmpnam(); This module makes use of the mktemp() function when called in the scalar context, which creates significantly more predictable temporary files. Additionally, the temporary file is created with world-writable (0666) permission. A local attacker could use this flaw to perform a symbolic link attack, overwriting arbitrary files accessible to a program using the Capture::Tiny module. References: https://github.com/dagolden/Capture-Tiny/issues/16 https://bugzilla.redhat.com/show_bug.cgi?id=1062424
bugbot adjusting priority
the patch is here https://github.com/dagolden/Capture-Tiny/commit/635c9eabd52ab8042b0c841823bd6e692de87924
I did already a submission https://build.suse.de/request/show/51480
SUSE-SU-2015:0316-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 862743 CVE References: CVE-2014-1875 Sources used: SUSE Linux Enterprise Build System Kit 12 (src): perl-Capture-Tiny-0.23-4.1
Seems fixed. openSUSE 13.2 was not affected (perl-Capture-Tiny-0.25) Leap 42.1 and 42.2 inherited the SLE Fix.