From ${URL} : Jakub Wilk discovered that perltidy's make_temporary_filename() function insecurely created temporary files via the use of the tmpnam() function. A local attacker could use this flaw to perform a symbolic link attack. Fix from Don Armstrong: http://git.donarmstrong.com/?p=perltidy.git;a=blob;f=debian/patches/fix_insecure_tmpnam_usage_740670 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
I've bumped package. Patch for this CVE is included for 20130922 version. Adding x86, amd64 and ppc herds for stable req.
amd64/ppc/x86 stable, cleanup done. @security, please vote. GLSA vote: no.
GLSA vote: no Closing as noglsa