First published: Sun Dec 20 2009(Updated: )
The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Automake | =1.11.1 | |
GNU Automake | =branch-1-9 | |
GNU Automake | =1.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4029 has been classified with a moderate severity due to its potential to introduce a race condition with insecure permissions.
To fix CVE-2009-4029, upgrade GNU Automake to version 1.11.2 or later, or apply the relevant patches.
CVE-2009-4029 affects GNU Automake versions 1.10.3, 1.11.1, and branch versions from 1-4 to 1-9.
The nature of the vulnerability in CVE-2009-4029 involves the assignment of insecure permissions (777) to directories during the creation of distribution tarballs.
Yes, CVE-2009-4029 is applicable to production environments using vulnerable versions of GNU Automake and poses a security risk.