Bug 1074720 (CVE-2014-2277)

Summary: CVE-2014-2277 perltidy: insecure temporary file creation
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: lxtnow, mmaslano, paul, perl-devel, perl-maint-list, ppisar, ville.skytta
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-06-16 09:04:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1074721, 1074722, 1074723    
Bug Blocks: 1072135    

Description Murray McAllister 2014-03-11 00:53:48 UTC
Jakub Wilk discovered that perltidy's make_temporary_filename() function insecurely created temporary files via the use of the tmpnam() function. A local attacker could use this flaw to perform a symbolic link attack.

Fix from Don Armstrong: http://git.donarmstrong.com/?p=perltidy.git;a=blob;f=debian/patches/fix_insecure_tmpnam_usage_740670

Comment 1 Murray McAllister 2014-03-11 00:54:50 UTC
MITRE assigned CVE-2014-2277 to this issue:

http://seclists.org/oss-sec/2014/q1/533

Comment 2 Murray McAllister 2014-03-11 00:56:09 UTC
Created perltidy tracking bugs for this issue:

Affects: fedora-all [bug 1074721]
Affects: epel-5 [bug 1074722]

Comment 5 Fedora Update System 2014-03-24 06:37:23 UTC
perltidy-20130922-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 6 Fedora Update System 2014-03-24 06:39:20 UTC
perltidy-20130922-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Murray McAllister 2014-07-17 04:47:47 UTC
Statement:

This issue affects the versions of perltidy as shipped with Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/

Comment 8 Fedora Update System 2014-12-11 06:33:59 UTC
perltidy-20070801-2.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Product Security DevOps Team 2021-06-16 09:04:02 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2014-2277