Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20241204091439.zagujeidn25nouor@jwilk.net>
Date: Wed, 4 Dec 2024 10:14:39 +0100
From: Jakub Wilk <jwilk@...lk.net>
To: oss-security@...ts.openwall.com
Subject: Re: Local Privilege Escalations in needrestart

* Qualys Security Advisory <qsa@...lys.com>, 2024-11-19 16:25:
>We therefore grepped the ScanDeps module for one of the oldest pitfalls 
>of the Perl programming language: the two-argument form of open(),

When looking for this kind of vulnerabilities a few years ago, I patched 
my Perl interpreter to issue runtime warnings against suspicious 
two-argument open() calls.

The patch still applies cleanly, and apparently even works, so I've 
attached it here. Maybe someone will find it useful.

-- 
Jakub Wilk

View attachment "perl-two-arg-open.patch" of type "text/x-diff" (732 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.