First published: Thu Jun 01 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
File\ \ | <2.13 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/perl | 5.32.1-4+deb11u3 5.32.1-4+deb11u1 5.36.0-7+deb12u1 5.38.2-5 5.40.0-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6512 is a vulnerability in the File-Path module for Perl that allows attackers to set the mode on arbitrary files through a race condition in the rmtree and remove_tree functions.
The severity of CVE-2017-6512 is medium, with a severity value of 5.9.
The File-Path module before version 2.13 for Perl is affected, as well as Canonical Ubuntu Linux versions 12.04, 14.04, 16.04, and 17.10, and Debian Debian Linux versions 8.0 and 9.0.
To fix CVE-2017-6512 on Debian Linux, update the Perl package to version 5.36.0-7 or 5.36.0-9.
You can find more information about CVE-2017-6512 on the MITRE CVE database (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512), the CPAN website (http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes), and the Ubuntu security notices (https://ubuntu.com/security/notices/USN-3625-1).