Advisories ยป MGASA-2018-0047

Updated perl packages fix security vulnerability

Publication date: 03 Jan 2018
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-1238 , CVE-2017-6512 , CVE-2017-12837 , CVE-2017-12883


John Lightsey and Todd Rinaldo reported that the opportunistic loading of
optional modules can make many programs unintentionally load code from the
current working directory (which might be changed to another directory
without the user realising) and potentially leading to privilege escalation

The cPanel Security Team reported a time of check to time of use (TOCTTOU)
race condition flaw in File::Path, a core module from Perl to create or
remove directory trees. An attacker can take advantage of this flaw to set
the mode on an attacker-chosen file to a attacker-chosen value

Jakub Wilk reported a heap buffer overflow flaw in the regular expression
compiler, allowing a remote attacker to cause a denial of service via a
 specially crafted regular expression with the case-insensitive modifier

Jakub Wilk reported a buffer over-read flaw in the regular expression
parser, allowing a remote attacker to cause a denial of service or
information leak (CVE-2017-12883).

The perl-libintl-perl, perl-MIME-Charset, perl-MIME-EncWords,
perl-Module-Build, perl-Sys-Syslog, and perl-Unicode-LineBreak packages
have been patched and the perl-Module-Load-Conditional and perl-Net-DNS
packages have been updated to fix CVE-2016-1238 as well.

The perl-File-Path package has also been patched to fix CVE-2017-6512.