|Summary:||<dev-perl/Config-IniFiles-2.710.0 : Insecure Temporary File Security Issue (CVE-2012-2451)|
|Product:||Gentoo Security||Reporter:||Agostino Sarubbo <ago>|
|Component:||Vulnerabilities||Assignee:||Gentoo Security <security>|
|Package list:||Runtime testing required:||---|
Description Agostino Sarubbo 2012-05-03 14:56:04 UTC
From secunia advisory at $URL: Description A security issue has been reported in the Config::IniFiles module for Perl, which can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to the application using a temporary file in an insecure manner, which can be exploited to e.g. overwrite arbitrary files via symlink attacks. The security issue is reported in versions prior to 2.71. Solution Update to version 2.71.
Comment 1 Agostino Sarubbo 2012-05-03 14:56:26 UTC
@maintainer, ok to stabilize it?
Comment 2 Torsten Veller (RETIRED) 2012-05-03 15:41:21 UTC
Comment 3 Agostino Sarubbo 2012-05-03 16:08:24 UTC
Thanks. Arches, please test and mark stable: =dev-perl/Config-IniFiles-2.710.0 Target KEYWORDS : "alpha amd64 ia64 ppc sparc x86"
Comment 4 Myckel Habets 2012-05-04 22:41:01 UTC
Builds fine on x86. Rdeps build fine as well. Please mark stable for x86.
Comment 5 Agostino Sarubbo 2012-05-06 12:18:50 UTC
Comment 6 Andreas Schürch 2012-05-06 18:02:32 UTC
x86 stable, thanks Myckel!
Comment 7 Tobias Klausmann 2012-05-12 12:50:56 UTC
Stable on alpha.
Comment 8 Raúl Porcel (RETIRED) 2012-05-12 16:33:04 UTC
ia64/sparc keywords dropped
Comment 9 Brent Baude (RETIRED) 2012-05-21 17:29:03 UTC
Comment 10 Sean Amoss 2012-05-22 20:18:54 UTC
Thanks, everyone. GLSA vote: yes.
Comment 11 Tim Sammut (RETIRED) 2012-05-23 02:55:59 UTC
Vote yes too. New GLSA request filed.
Comment 12 GLSAMaker/CVETool Bot 2012-07-13 21:20:29 UTC
CVE-2012-2451 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2451): The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.
Comment 13 GLSAMaker/CVETool Bot 2012-08-14 21:23:45 UTC
This issue was resolved and addressed in GLSA 201208-05 at http://security.gentoo.org/glsa/glsa-201208-05.xml by GLSA coordinator Sean Amoss (ackle).