Bug ID | 1042218 |
---|---|
Summary | VUL-0: CVE-2017-6512 perl-File-Path: rmtree/remove_tree race condition |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.2 |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Minor |
Priority | P5 - None |
Component | Security |
Assignee | chris@computersalat.de |
Reporter | abergmann@suse.com |
QA Contact | qa-bugs@suse.de |
CC | dlovasko@suse.com |
Found By | Security Response Team |
Blocker | --- |
rh#1457832 A vulnerability was found in perl File-Path. In the rmtree() and remove_tree() functions, the chmod()logic to make directories traversable can be abused to set the mode on an attacker-chosen file to an attacker-chosen value. This is due to the time-of-check-to-time-of-use (TOCTTOU) race condition between the stat() that decides the inode is a directory and the chmod() that tries to make it user-rwx. Upstream issue: https://rt.cpan.org/Public/Bug/Display.html?id=121951 Upstream patch: https://github.com/jkeenan/File-Path/commit/e5ef95276ee8ad471c66ee574a5d42552b3a6af2 References: https://bugzilla.redhat.com/show_bug.cgi?id=1457832 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6512 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512