Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40909

Опубликовано: 30 мая 2025
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit. The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6

A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') or CWE-426: Untrusted Search Path vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system’s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation reduces the likelihood of concurrent execution conflicts and contains any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6perlOut of support scope
Red Hat Enterprise Linux 7perlOut of support scope
Red Hat OpenShift Container Platform 4rhcosFix deferred
Red Hat Enterprise Linux 10perlFixedRHSA-2025:1205629.07.2025
Red Hat Enterprise Linux 8perlFixedRHSA-2025:1180528.07.2025
Red Hat Enterprise Linux 8perlFixedRHSA-2025:1180528.07.2025
Red Hat Enterprise Linux 9perlFixedRHSA-2025:1180428.07.2025
Red Hat Enterprise Linux 9.4 Extended Update SupportperlFixedRHSA-2025:1154522.07.2025
Red Hat Discovery 2registry.redhat.io/discovery/discovery-server-rhel9FixedRHSA-2025:1326706.08.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-362
Дефект:
CWE-426
https://bugzilla.redhat.com/show_bug.cgi?id=2369407perl: Perl threads have a working directory race condition where file operations may target unintended paths

EPSS

Процентиль: 0%
0.00007
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
2 месяца назад

Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit. The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6

CVSS3: 5.9
nvd
2 месяца назад

Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit. The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6

CVSS3: 5.9
msrc
14 дней назад

Описание отсутствует

CVSS3: 5.9
debian
2 месяца назад

Perl threads have a working directory race condition where file operat ...

suse-cvrf
около 2 месяцев назад

Security update for perl

EPSS

Процентиль: 0%
0.00007
Низкий

5.9 Medium

CVSS3