From debian bugzilla at $URL: Proc::ProcessTable can cache TTY information (not enabled by default). For this it uses the file /tmp/TTYDEVS. If caching is enabled, there is a race condition that allows to overwrite arbitrary files in ProcessTable.pm: 102 if( -r $TTYDEVSFILE ) 103 { 104 $_ = Storable::retrieve($TTYDEVSFILE); [...] 107 else 108 { [...] 112 Storable::store(\%Proc::ProcessTable::TTYDEVS, $TTYDEVSFILE); If a symlink /tmp/TTYDEVS is created between line 102 and 112, the file the link points to is overwritten. Alternatively wrong information can be provided. The relevant code path can be reached with perl -MProc::ProcessTable -e 'my $t = Proc::ProcessTable->new(cache_ttys => 1, enable_ttys => 1); $t->table;'
CVE-2011-4363 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4363): ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS.
According to https://rt.cpan.org/Public/Bug/Display.html?id=72862 this is fixed in 0.47(0.470.0 in Gentoo versioning system)
version 0.480.0 in the tree
(In reply to Mikle Kolyada from comment #3) > version 0.480.0 in the tree Thanks. Arches, please test and mark stable =dev-perl/Proc-ProcessTable-0.480.0 Target keywords: alpha amd64 hppa ia64 ppc ppc64 sparc x86
Stable for HPPA.
amd64/x86 stable
alpha stable
ia64 stable
ppc64 stable
ppc stable
sparc stable
Ready for vote, I vote NO.
GLSA vote: No Closing as noglsa