Javier Fernández-Sanguino Peña from the Debian Security Audit Project
discovered that the DBI library, the Perl5 database interface, creates
a tmporary file in an insecure manner. This can be exploited by a
malicious user to overwrite arbitrary files owned by the person
executing the program.
No upstream patch yet. Will attach Debian workaround patch later if needed.
Created attachment 49377 [details, diff]
Patch from Martin Schulze @ debian
Patch looks to apply cleanly on all versions in dev-perl. Just give me the word and we can roll this out.
Micheal please attach the updated ebuild to this bug and we will call needed arch testers individually.
Created attachment 49432 [details]
as requested, 37-r1
Created attachment 49433 [details]
two revision posted (based on KEYWORDing). 1.46 went into the tree as a new copy from upstream a few minutes ago (the two attached are in no way in portage atm).
This is public now. Micheal please commit the updated ebuild.
GLSA should probably be grouped with bug 75696 (both Perl, both tmpfile vulns).
Michael, could you please bump on dev-perl/perl side too ?