From 841ecbf1b25be03c8365d6f616c5e131a57c285a Mon Sep 17 00:00:00 2001 From: Jon Moroney Date: Thu, 9 Sep 2021 14:45:16 -0700 Subject: [PATCH] Add rustsec advisory for GHSA-pp74-39w2-v4w9 (#1016) --- crates/pleaser/RUSTSEC-0000-0000.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 crates/pleaser/RUSTSEC-0000-0000.md diff --git a/crates/pleaser/RUSTSEC-0000-0000.md b/crates/pleaser/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..cc768bf --- /dev/null +++ b/crates/pleaser/RUSTSEC-0000-0000.md @@ -0,0 +1,16 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "pleaser" +date = "2021-05-27" +url = "https://nvd.nist.gov/vuln/detail/CVE-2021-31154" +categories = ["privilege-escalation"] +cvss = "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" +aliases = ["CVE-2021-31154"] +[versions] +patched = [">= 0.4"] +``` + +# Permissions bypass in pleaser + +pleaseedit in pleaser before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.