Advisories ยป MGASA-2018-0047

Updated perl packages fix security vulnerability

Publication date: 03 Jan 2018
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-1238 , CVE-2017-6512 , CVE-2017-12837 , CVE-2017-12883

Description

John Lightsey and Todd Rinaldo reported that the opportunistic loading of
optional modules can make many programs unintentionally load code from the
current working directory (which might be changed to another directory
without the user realising) and potentially leading to privilege escalation
(CVE-2016-1238).

The cPanel Security Team reported a time of check to time of use (TOCTTOU)
race condition flaw in File::Path, a core module from Perl to create or
remove directory trees. An attacker can take advantage of this flaw to set
the mode on an attacker-chosen file to a attacker-chosen value
(CVE-2017-6512).

Jakub Wilk reported a heap buffer overflow flaw in the regular expression
compiler, allowing a remote attacker to cause a denial of service via a
 specially crafted regular expression with the case-insensitive modifier
(CVE-2017-12837).

Jakub Wilk reported a buffer over-read flaw in the regular expression
parser, allowing a remote attacker to cause a denial of service or
information leak (CVE-2017-12883).

The perl-libintl-perl, perl-MIME-Charset, perl-MIME-EncWords,
perl-Module-Build, perl-Sys-Syslog, and perl-Unicode-LineBreak packages
have been patched and the perl-Module-Load-Conditional and perl-Net-DNS
packages have been updated to fix CVE-2016-1238 as well.

The perl-File-Path package has also been patched to fix CVE-2017-6512.
                

References

SRPMS

5/core