-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > mkdtskel and mkxmltype using insecurely temporary files using the pid > of the process in the temporary file name. > > /tmp/_xml_$$ > > https://bugs.debian.org/756566
Use CVE-2014-5260. > fixed in XML-DT 0.65 upstream, see > > https://metacpan.org/diff/file?target=AMBS/XML-DT-0.65/&source=AMBS/XML-DT-0.63/ This actually doesn't seem to be fixed. However, we don't immediately see a security problem in version 0.65 (only a usability problem), so a second CVE ID isn't assigned at this point. Specifically, the latest version has: https://metacpan.org/source/AMBS/XML-DT-0.65/mkxmltype system("head -$lines $fname | xmllint --recover - > $fname"); which looks unintended (maybe $fname will always end up as a zero-length file?). This apparently also affects libxml-dt-perl (0.65-1) from the https://packages.debian.org/sid/libxml-dt-perl page. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJT7mhqAAoJEKllVAevmvmsd6wH/1kq/+SPIZPj73hx7gHdF6Bs apbtdF7zITzl+o9sNkiq/PR8a8Hln6ZvqCuyZMinQu9xv1mfanpheSsCw810q5ou dP1Bhv+4zN91ukEMKnugYH3xnLn3GXnm0XXDL+mN90I4ev/CKJbKzLoeqHWxy0Ah k1YDC1dG5eS9EIT6OhOWAZKX1zYB5SJ8SiyIhomp94Jymtnqd6IKs7kTkinaeoJ6 AgSEFugTT6pr46rRKf+dkZ+KhsrhTLYVUGVajwYVOSQRPKLaMdIfdAwcM99fhfrX k81O1GIO2CPRXslzzdqTTgoqaPjx9TqXQZdCA2CCKrDH1RHIpyPQCNrGAbTOeMk= =dNlw -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org