Summary: | dev-lang/perl: CVE-2018-12015: Archive::Tar: directory traversal vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Ian Zimmerman <nobrowser> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | kentnl |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugs.debian.org/900834 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
*** This bug has been marked as a duplicate of bug 657968 *** |
Quoting $URL: > By default, the Archive::Tar module doesn't allow extracting files > outside the current working directory. However, you can bypass this > secure extraction mode easily by putting a symlink and a regular file > with the same name into the tarball.