Skip Menu |

This queue is for tickets about the XML-DT CPAN distribution.

Report information
The Basics
Id: 97655
Status: resolved
Priority: 0/
Queue: XML-DT

People
Owner: Nobody in particular
Requestors: dam [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



From: dam [...] cpan.org
Subject: [PATCH] Insecure use of temporary files
We have the following bug reported to the Debian package of XML-DT (https://bugs.debian.org/756566): ------8<-----------8<-----------8<-----------8<-----------8<----- Package: libxml-dt-perl Version: 0.62-1 Severity: important Tags: security The libxml-dt-perl package installs the script "/usr/bin/mkxmltype" which blindly overwrites the contents of the file: /tmp/_xml_$$ (Where '$$' corresponds to the PID of the process.) This is insecure and can allow the truncation of arbitrary files the user has permission to access. A similar problem exists in /usr/bin/mkdtskel, again the file accessed is /tmp/_xml_$$. Both scripts should be updated to use File::Temp, or similar. Steve -- http://steve.org.uk/ -- System Information: Debian Release: 7.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.14-0.bpo.1-amd64 (SMP w/8 CPU cores) Locale: LANG=en_US.UTF8, LC_CTYPE=en_US.UTF8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF8) Shell: /bin/sh linked to /bin/dash ------8<-----------8<-----------8<-----------8<-----------8<----- The Debian package of XML-DT has the following patch applied to fix the bug. The patch is tracked in our Git repository at http://anonscm.debian.org/gitweb/?p=pkg-perl/packages/libxml-dt-perl.git;a=blob;f=debian/patches/insecure-tmp.patch;hb=HEAD Thanks for considering, Damyan Ivanov, Debian Perl Group
Here's the patch.

Message body is not shown because sender requested not to inline it.

On Thu Jul 31 15:03:30 2014, DAM wrote: Show quoted text
> Here's the patch.
Thanks. Will apply and release later today. Cheers ambs
Hi I have requested a CVE on oss-security mailinglist: http://www.openwall.com/lists/oss-security/2014/07/31/3 Regards, Salvatore
Hello. Applied and uploaded to CPAN. Already available in some mirrors: https://metacpan.org/release/AMBS/XML-DT-0.64 Thank you, once again. Alberto