Security Advisories (2)
perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete.
The make_temporary_filename function in perltidy 20120701-1 and earlier allows local users to obtain sensitive information or write to arbitrary files via a symlink attack, related to use of the tmpnam function.
- http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130464.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130479.html
- http://www.openwall.com/lists/oss-security/2014/03/09/1
- http://www.securityfocus.com/bid/66139
- https://bugzilla.redhat.com/show_bug.cgi?id=1074720
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92104
- https://github.com/perltidy/perltidy/issues/193
No POD found for testfile.pl.
Time to read the source?
Module Install Instructions
To install Perl::Tidy, copy and paste the appropriate command in to your terminal.
cpanm Perl::Tidy
perl -MCPAN -e shell
install Perl::Tidy
For more information on module installation, please visit the detailed CPAN module installation guide.