LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Updated perl packages fix denial of service Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake A double free vulnerability in Perl 5.8.8 and earlier versions, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. The updated packages have been patched to prevent this.
 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:100
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : perl
 Date    : May 11, 2008
 Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A double free vulnerability in Perl 5.8.8 and earlier versions,
 allows context-dependent attackers to cause a denial of service
 (memory corruption and crash) via a crafted regular expression
 containing UTF8 characters.
 
 The updated packages have been patched to prevent this.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 664ca790014a73481d8e0432652c9b0b  2007.1/i586/perl-5.8.8-10.2mdv2007.1.i586.rpm
 ce416fc49eddf4f744be678fe7576e10  2007.1/i586/perl-base-5.8.8-10.2mdv2007.1.i586.rpm
 a20d1e14e1aadd3f863d34888211ace1  2007.1/i586/perl-devel-5.8.8-10.2mdv2007.1.i586.rpm
 a7f55a0ecd6be1878655b2266046a4d3  2007.1/i586/perl-doc-5.8.8-10.2mdv2007.1.i586.rpm
 b79a30665df6cf6094bfa0aad344eed4  2007.1/i586/perl-suid-5.8.8-10.2mdv2007.1.i586.rpm 
 86ce0e141f4ab82250ae6e247f45d2fc  2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 225cbadc92ce47b0843903a64a63d79d  2007.1/x86_64/perl-5.8.8-10.2mdv2007.1.x86_64.rpm
 a77595f32f641e78794d2fcb72fe120a  2007.1/x86_64/perl-base-5.8.8-10.2mdv2007.1.x86_64.rpm
 0266b1964b67c057be7393976c0d2f5e  2007.1/x86_64/perl-devel-5.8.8-10.2mdv2007.1.x86_64.rpm
 0211288533d2ead15e2958b4703a9376  2007.1/x86_64/perl-doc-5.8.8-10.2mdv2007.1.x86_64.rpm
 7df3c3084401b81c1733c6d83bc178b9  2007.1/x86_64/perl-suid-5.8.8-10.2mdv2007.1.x86_64.rpm 
 86ce0e141f4ab82250ae6e247f45d2fc  2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 3f698bfd85b3b40498f6116513405310  2008.0/i586/perl-5.8.8-12.2mdv2008.0.i586.rpm
 fd8ba80974608688d9722ad3a4f2ae76  2008.0/i586/perl-base-5.8.8-12.2mdv2008.0.i586.rpm
 efbcf93b4378123a7d5b7f7e14a0dc25  2008.0/i586/perl-devel-5.8.8-12.2mdv2008.0.i586.rpm
 5e4b82208d8b58deef43ebc40da1a216  2008.0/i586/perl-doc-5.8.8-12.2mdv2008.0.i586.rpm
 a15614b2e52a0af5fdbac084b96c00cf  2008.0/i586/perl-suid-5.8.8-12.2mdv2008.0.i586.rpm 
 8558ac9e417118785e894e64ff07d04c  2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 6710a7820500860d6e3034ac1402106c  2008.0/x86_64/perl-5.8.8-12.2mdv2008.0.x86_64.rpm
 79d39d3ddbfbfc6b3b0547d5e927b1e8  2008.0/x86_64/perl-base-5.8.8-12.2mdv2008.0.x86_64.rpm
 2aeb84fbea01b4ec1204614c860d254b  2008.0/x86_64/perl-devel-5.8.8-12.2mdv2008.0.x86_64.rpm
 4fe90113442934652ebae0a7f0a3edca  2008.0/x86_64/perl-doc-5.8.8-12.2mdv2008.0.x86_64.rpm
 a112b5b5156c390003b1efa335deecb5  2008.0/x86_64/perl-suid-5.8.8-12.2mdv2008.0.x86_64.rpm 
 8558ac9e417118785e894e64ff07d04c  2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm

 Corporate 3.0:
 6541cd09e61b24557dc2a6da79a26e75  corporate/3.0/i586/perl-5.8.3-5.8.C30mdk.i586.rpm
 3361f8b0bcc7264024d8e8b230ef4046  corporate/3.0/i586/perl-base-5.8.3-5.8.C30mdk.i586.rpm
 8d3bdf4209f003efc7314c62313a1868  corporate/3.0/i586/perl-devel-5.8.3-5.8.C30mdk.i586.rpm
 05b2077f7c2826a738495bb3b51493fb  corporate/3.0/i586/perl-doc-5.8.3-5.8.C30mdk.i586.rpm 
 717f3c1eb7aea5ccbb7c34015a1d1a14  corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 88004594708e21886759c473aa7438a9  corporate/3.0/x86_64/perl-5.8.3-5.8.C30mdk.x86_64.rpm
 836fd16b824a68e5ae9ee38dcc6dda98  corporate/3.0/x86_64/perl-base-5.8.3-5.8.C30mdk.x86_64.rpm
 633826ab46f461fbdb4e48deb662b50b  corporate/3.0/x86_64/perl-devel-5.8.3-5.8.C30mdk.x86_64.rpm
 9f8c8ea413e5558c236c29963555d89b  corporate/3.0/x86_64/perl-doc-5.8.3-5.8.C30mdk.x86_64.rpm 
 717f3c1eb7aea5ccbb7c34015a1d1a14  corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm

 Corporate 4.0:
 02c043c39340814bf586083b584dbbd9  corporate/4.0/i586/perl-5.8.7-3.5.20060mlcs4.i586.rpm
 24e5aa7523525378c319350cb867b4b8  corporate/4.0/i586/perl-base-5.8.7-3.5.20060mlcs4.i586.rpm
 1cad5220ac2bc693ba9fc60a6406b72b  corporate/4.0/i586/perl-devel-5.8.7-3.5.20060mlcs4.i586.rpm
 62dcd4a7f4c6075348a08dadc9454dfd  corporate/4.0/i586/perl-doc-5.8.7-3.5.20060mlcs4.i586.rpm
 6327e773b81b1f47f679ec0cae4ce2d2  corporate/4.0/i586/perl-suid-5.8.7-3.5.20060mlcs4.i586.rpm 
 f0b4a8566ad3a8a374e49b33694f6a72  corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 6bf5bc56705827f3b4dbc01e8f963491  corporate/4.0/x86_64/perl-5.8.7-3.5.20060mlcs4.x86_64.rpm
 efccb85f0e99076d8f7ebd9a63a22cd0  corporate/4.0/x86_64/perl-base-5.8.7-3.5.20060mlcs4.x86_64.rpm
 32d3fa0d8c5e2cdce13420959f2352fd  corporate/4.0/x86_64/perl-devel-5.8.7-3.5.20060mlcs4.x86_64.rpm
 fb292ea2073219978d11234102949ecc  corporate/4.0/x86_64/perl-doc-5.8.7-3.5.20060mlcs4.x86_64.rpm
 182f5f98dfbbaf04d4c989b174541767  corporate/4.0/x86_64/perl-suid-5.8.7-3.5.20060mlcs4.x86_64.rpm 
 f0b4a8566ad3a8a374e49b33694f6a72  corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 c64dd4baae4ded5ce516561017c48782  mnf/2.0/i586/perl-5.8.3-5.8.M20mdk.i586.rpm
 dba8966ad830867b6fe22b933353df32  mnf/2.0/i586/perl-base-5.8.3-5.8.M20mdk.i586.rpm
 f2433e06a5fa097e31046f71190e29ce  mnf/2.0/i586/perl-devel-5.8.3-5.8.M20mdk.i586.rpm
 33d19b22f598e5c72dd5d1ef9ac3e4e0  mnf/2.0/i586/perl-doc-5.8.3-5.8.M20mdk.i586.rpm 
 90c1b9688da6da419fc85e947a279acc  mnf/2.0/SRPMS/perl-5.8.3-5.8.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.