FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  351541
Date:      2014-04-18
Time:      14:56:43Z
Committer: ohauer

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
10f38033-e006-11e1-9304-000000000000automake -- Insecure 'distcheck' recipe granted world-writable distdir

GNU reports:

The recipe of the 'distcheck' target granted temporary world-write permissions on the extracted distdir. This introduced a locally exploitable race condition for those who run "make distcheck" with a non-restrictive umask (e.g., 022) in a directory that was accessible by others. A successful exploit would result in arbitrary code execution with the privileges of the user running "make distcheck".

It is important to stress that this vulnerability impacts not only the Automake package itself, but all packages with Automake-generated makefiles. For an effective fix it is necessary to regenerate the Makefile.in files with a fixed Automake version.


Discovery 2012-07-09
Entry 2012-08-06
automake
lt 1.12.2

CVE-2012-3386
https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html
36235c38-e0a8-11e1-9f4d-002354ed89bcautomake -- Insecure 'distcheck' recipe granted world-writable distdir

GNU reports:

The recipe of the 'distcheck' target granted temporary world-write permissions on the extracted distdir. This introduced a locally exploitable race condition for those who run "make distcheck" with a non-restrictive umask (e.g., 022) in a directory that was accessible by others. A successful exploit would result in arbitrary code execution with the privileges of the user running "make distcheck".

It is important to stress that this vulnerability impacts not only the Automake package itself, but all packages with Automake-generated makefiles. For an effective fix it is necessary to regenerate the Makefile.in files with a fixed Automake version.


Discovery 2012-07-09
Entry 2012-08-06
Modified 2012-08-25
automake
lt 1.12.2

CVE-2012-3386
https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html
36235c38-e0a8-11e1-9f4d-002354ed89bcautomake -- Insecure 'distcheck' recipe granted world-writable distdir

GNU reports:

The recipe of the 'distcheck' target granted temporary world-write permissions on the extracted distdir. This introduced a locally exploitable race condition for those who run "make distcheck" with a non-restrictive umask (e.g., 022) in a directory that was accessible by others. A successful exploit would result in arbitrary code execution with the privileges of the user running "make distcheck".

It is important to stress that this vulnerability impacts not only the Automake package itself, but all packages with Automake-generated makefiles. For an effective fix it is necessary to regenerate the Makefile.in files with a fixed Automake version.


Discovery 2012-07-09
Entry 2012-08-06
Modified 2012-08-25
automake
lt 1.12.2

CVE-2012-3386
https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html