[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1Jv8Do-0006lR-UC@titan.mandriva.com>
Date: Sun, 11 May 2008 03:52:00 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:100 ] - Updated perl packages fix
denial of service vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:100
http://www.mandriva.com/security/
_______________________________________________________________________
Package : perl
Date : May 11, 2008
Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
A double free vulnerability in Perl 5.8.8 and earlier versions,
allows context-dependent attackers to cause a denial of service
(memory corruption and crash) via a crafted regular expression
containing UTF8 characters.
The updated packages have been patched to prevent this.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
664ca790014a73481d8e0432652c9b0b 2007.1/i586/perl-5.8.8-10.2mdv2007.1.i586.rpm
ce416fc49eddf4f744be678fe7576e10 2007.1/i586/perl-base-5.8.8-10.2mdv2007.1.i586.rpm
a20d1e14e1aadd3f863d34888211ace1 2007.1/i586/perl-devel-5.8.8-10.2mdv2007.1.i586.rpm
a7f55a0ecd6be1878655b2266046a4d3 2007.1/i586/perl-doc-5.8.8-10.2mdv2007.1.i586.rpm
b79a30665df6cf6094bfa0aad344eed4 2007.1/i586/perl-suid-5.8.8-10.2mdv2007.1.i586.rpm
86ce0e141f4ab82250ae6e247f45d2fc 2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
225cbadc92ce47b0843903a64a63d79d 2007.1/x86_64/perl-5.8.8-10.2mdv2007.1.x86_64.rpm
a77595f32f641e78794d2fcb72fe120a 2007.1/x86_64/perl-base-5.8.8-10.2mdv2007.1.x86_64.rpm
0266b1964b67c057be7393976c0d2f5e 2007.1/x86_64/perl-devel-5.8.8-10.2mdv2007.1.x86_64.rpm
0211288533d2ead15e2958b4703a9376 2007.1/x86_64/perl-doc-5.8.8-10.2mdv2007.1.x86_64.rpm
7df3c3084401b81c1733c6d83bc178b9 2007.1/x86_64/perl-suid-5.8.8-10.2mdv2007.1.x86_64.rpm
86ce0e141f4ab82250ae6e247f45d2fc 2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm
Mandriva Linux 2008.0:
3f698bfd85b3b40498f6116513405310 2008.0/i586/perl-5.8.8-12.2mdv2008.0.i586.rpm
fd8ba80974608688d9722ad3a4f2ae76 2008.0/i586/perl-base-5.8.8-12.2mdv2008.0.i586.rpm
efbcf93b4378123a7d5b7f7e14a0dc25 2008.0/i586/perl-devel-5.8.8-12.2mdv2008.0.i586.rpm
5e4b82208d8b58deef43ebc40da1a216 2008.0/i586/perl-doc-5.8.8-12.2mdv2008.0.i586.rpm
a15614b2e52a0af5fdbac084b96c00cf 2008.0/i586/perl-suid-5.8.8-12.2mdv2008.0.i586.rpm
8558ac9e417118785e894e64ff07d04c 2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
6710a7820500860d6e3034ac1402106c 2008.0/x86_64/perl-5.8.8-12.2mdv2008.0.x86_64.rpm
79d39d3ddbfbfc6b3b0547d5e927b1e8 2008.0/x86_64/perl-base-5.8.8-12.2mdv2008.0.x86_64.rpm
2aeb84fbea01b4ec1204614c860d254b 2008.0/x86_64/perl-devel-5.8.8-12.2mdv2008.0.x86_64.rpm
4fe90113442934652ebae0a7f0a3edca 2008.0/x86_64/perl-doc-5.8.8-12.2mdv2008.0.x86_64.rpm
a112b5b5156c390003b1efa335deecb5 2008.0/x86_64/perl-suid-5.8.8-12.2mdv2008.0.x86_64.rpm
8558ac9e417118785e894e64ff07d04c 2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm
Corporate 3.0:
6541cd09e61b24557dc2a6da79a26e75 corporate/3.0/i586/perl-5.8.3-5.8.C30mdk.i586.rpm
3361f8b0bcc7264024d8e8b230ef4046 corporate/3.0/i586/perl-base-5.8.3-5.8.C30mdk.i586.rpm
8d3bdf4209f003efc7314c62313a1868 corporate/3.0/i586/perl-devel-5.8.3-5.8.C30mdk.i586.rpm
05b2077f7c2826a738495bb3b51493fb corporate/3.0/i586/perl-doc-5.8.3-5.8.C30mdk.i586.rpm
717f3c1eb7aea5ccbb7c34015a1d1a14 corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm
Corporate 3.0/X86_64:
88004594708e21886759c473aa7438a9 corporate/3.0/x86_64/perl-5.8.3-5.8.C30mdk.x86_64.rpm
836fd16b824a68e5ae9ee38dcc6dda98 corporate/3.0/x86_64/perl-base-5.8.3-5.8.C30mdk.x86_64.rpm
633826ab46f461fbdb4e48deb662b50b corporate/3.0/x86_64/perl-devel-5.8.3-5.8.C30mdk.x86_64.rpm
9f8c8ea413e5558c236c29963555d89b corporate/3.0/x86_64/perl-doc-5.8.3-5.8.C30mdk.x86_64.rpm
717f3c1eb7aea5ccbb7c34015a1d1a14 corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm
Corporate 4.0:
02c043c39340814bf586083b584dbbd9 corporate/4.0/i586/perl-5.8.7-3.5.20060mlcs4.i586.rpm
24e5aa7523525378c319350cb867b4b8 corporate/4.0/i586/perl-base-5.8.7-3.5.20060mlcs4.i586.rpm
1cad5220ac2bc693ba9fc60a6406b72b corporate/4.0/i586/perl-devel-5.8.7-3.5.20060mlcs4.i586.rpm
62dcd4a7f4c6075348a08dadc9454dfd corporate/4.0/i586/perl-doc-5.8.7-3.5.20060mlcs4.i586.rpm
6327e773b81b1f47f679ec0cae4ce2d2 corporate/4.0/i586/perl-suid-5.8.7-3.5.20060mlcs4.i586.rpm
f0b4a8566ad3a8a374e49b33694f6a72 corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
6bf5bc56705827f3b4dbc01e8f963491 corporate/4.0/x86_64/perl-5.8.7-3.5.20060mlcs4.x86_64.rpm
efccb85f0e99076d8f7ebd9a63a22cd0 corporate/4.0/x86_64/perl-base-5.8.7-3.5.20060mlcs4.x86_64.rpm
32d3fa0d8c5e2cdce13420959f2352fd corporate/4.0/x86_64/perl-devel-5.8.7-3.5.20060mlcs4.x86_64.rpm
fb292ea2073219978d11234102949ecc corporate/4.0/x86_64/perl-doc-5.8.7-3.5.20060mlcs4.x86_64.rpm
182f5f98dfbbaf04d4c989b174541767 corporate/4.0/x86_64/perl-suid-5.8.7-3.5.20060mlcs4.x86_64.rpm
f0b4a8566ad3a8a374e49b33694f6a72 corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
c64dd4baae4ded5ce516561017c48782 mnf/2.0/i586/perl-5.8.3-5.8.M20mdk.i586.rpm
dba8966ad830867b6fe22b933353df32 mnf/2.0/i586/perl-base-5.8.3-5.8.M20mdk.i586.rpm
f2433e06a5fa097e31046f71190e29ce mnf/2.0/i586/perl-devel-5.8.3-5.8.M20mdk.i586.rpm
33d19b22f598e5c72dd5d1ef9ac3e4e0 mnf/2.0/i586/perl-doc-5.8.3-5.8.M20mdk.i586.rpm
90c1b9688da6da419fc85e947a279acc mnf/2.0/SRPMS/perl-5.8.3-5.8.M20mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFIJpX7mqjQ0CJFipgRAlOHAKDJlrfLWmbxBMPnWMAvTl1yabLWJwCghP42
ryxkDv8oh5J9zog3IJZlfh4=
=ytAJ
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists