Login
Newsletter
Werbung

Sicherheit: Denial of Service in perl
Aktuelle Meldungen Distributionen
Name: Denial of Service in perl
ID: MDVSA-2008:100
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Multi Network Firewall 2.0, Mandriva Corporate 4.0, Mandriva 2007.1, Mandriva 2008.0
Datum: So, 11. Mai 2008, 11:55
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
Applikationen: Perl

Originalnachricht

This is a multi-part message in MIME format...

------------=_1210499735-11275-4392


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:100
http://www.mandriva.com/security/
_______________________________________________________________________

Package : perl
Date : May 11, 2008
Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A double free vulnerability in Perl 5.8.8 and earlier versions,
allows context-dependent attackers to cause a denial of service
(memory corruption and crash) via a crafted regular expression
containing UTF8 characters.

The updated packages have been patched to prevent this.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
664ca790014a73481d8e0432652c9b0b
2007.1/i586/perl-5.8.8-10.2mdv2007.1.i586.rpm
ce416fc49eddf4f744be678fe7576e10
2007.1/i586/perl-base-5.8.8-10.2mdv2007.1.i586.rpm
a20d1e14e1aadd3f863d34888211ace1
2007.1/i586/perl-devel-5.8.8-10.2mdv2007.1.i586.rpm
a7f55a0ecd6be1878655b2266046a4d3
2007.1/i586/perl-doc-5.8.8-10.2mdv2007.1.i586.rpm
b79a30665df6cf6094bfa0aad344eed4
2007.1/i586/perl-suid-5.8.8-10.2mdv2007.1.i586.rpm
86ce0e141f4ab82250ae6e247f45d2fc
2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
225cbadc92ce47b0843903a64a63d79d
2007.1/x86_64/perl-5.8.8-10.2mdv2007.1.x86_64.rpm
a77595f32f641e78794d2fcb72fe120a
2007.1/x86_64/perl-base-5.8.8-10.2mdv2007.1.x86_64.rpm
0266b1964b67c057be7393976c0d2f5e
2007.1/x86_64/perl-devel-5.8.8-10.2mdv2007.1.x86_64.rpm
0211288533d2ead15e2958b4703a9376
2007.1/x86_64/perl-doc-5.8.8-10.2mdv2007.1.x86_64.rpm
7df3c3084401b81c1733c6d83bc178b9
2007.1/x86_64/perl-suid-5.8.8-10.2mdv2007.1.x86_64.rpm
86ce0e141f4ab82250ae6e247f45d2fc
2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm

Mandriva Linux 2008.0:
3f698bfd85b3b40498f6116513405310
2008.0/i586/perl-5.8.8-12.2mdv2008.0.i586.rpm
fd8ba80974608688d9722ad3a4f2ae76
2008.0/i586/perl-base-5.8.8-12.2mdv2008.0.i586.rpm
efbcf93b4378123a7d5b7f7e14a0dc25
2008.0/i586/perl-devel-5.8.8-12.2mdv2008.0.i586.rpm
5e4b82208d8b58deef43ebc40da1a216
2008.0/i586/perl-doc-5.8.8-12.2mdv2008.0.i586.rpm
a15614b2e52a0af5fdbac084b96c00cf
2008.0/i586/perl-suid-5.8.8-12.2mdv2008.0.i586.rpm
8558ac9e417118785e894e64ff07d04c
2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
6710a7820500860d6e3034ac1402106c
2008.0/x86_64/perl-5.8.8-12.2mdv2008.0.x86_64.rpm
79d39d3ddbfbfc6b3b0547d5e927b1e8
2008.0/x86_64/perl-base-5.8.8-12.2mdv2008.0.x86_64.rpm
2aeb84fbea01b4ec1204614c860d254b
2008.0/x86_64/perl-devel-5.8.8-12.2mdv2008.0.x86_64.rpm
4fe90113442934652ebae0a7f0a3edca
2008.0/x86_64/perl-doc-5.8.8-12.2mdv2008.0.x86_64.rpm
a112b5b5156c390003b1efa335deecb5
2008.0/x86_64/perl-suid-5.8.8-12.2mdv2008.0.x86_64.rpm
8558ac9e417118785e894e64ff07d04c
2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm

Corporate 3.0:
6541cd09e61b24557dc2a6da79a26e75
corporate/3.0/i586/perl-5.8.3-5.8.C30mdk.i586.rpm
3361f8b0bcc7264024d8e8b230ef4046
corporate/3.0/i586/perl-base-5.8.3-5.8.C30mdk.i586.rpm
8d3bdf4209f003efc7314c62313a1868
corporate/3.0/i586/perl-devel-5.8.3-5.8.C30mdk.i586.rpm
05b2077f7c2826a738495bb3b51493fb
corporate/3.0/i586/perl-doc-5.8.3-5.8.C30mdk.i586.rpm
717f3c1eb7aea5ccbb7c34015a1d1a14
corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm

Corporate 3.0/X86_64:
88004594708e21886759c473aa7438a9
corporate/3.0/x86_64/perl-5.8.3-5.8.C30mdk.x86_64.rpm
836fd16b824a68e5ae9ee38dcc6dda98
corporate/3.0/x86_64/perl-base-5.8.3-5.8.C30mdk.x86_64.rpm
633826ab46f461fbdb4e48deb662b50b
corporate/3.0/x86_64/perl-devel-5.8.3-5.8.C30mdk.x86_64.rpm
9f8c8ea413e5558c236c29963555d89b
corporate/3.0/x86_64/perl-doc-5.8.3-5.8.C30mdk.x86_64.rpm
717f3c1eb7aea5ccbb7c34015a1d1a14
corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm

Corporate 4.0:
02c043c39340814bf586083b584dbbd9
corporate/4.0/i586/perl-5.8.7-3.5.20060mlcs4.i586.rpm
24e5aa7523525378c319350cb867b4b8
corporate/4.0/i586/perl-base-5.8.7-3.5.20060mlcs4.i586.rpm
1cad5220ac2bc693ba9fc60a6406b72b
corporate/4.0/i586/perl-devel-5.8.7-3.5.20060mlcs4.i586.rpm
62dcd4a7f4c6075348a08dadc9454dfd
corporate/4.0/i586/perl-doc-5.8.7-3.5.20060mlcs4.i586.rpm
6327e773b81b1f47f679ec0cae4ce2d2
corporate/4.0/i586/perl-suid-5.8.7-3.5.20060mlcs4.i586.rpm
f0b4a8566ad3a8a374e49b33694f6a72
corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6bf5bc56705827f3b4dbc01e8f963491
corporate/4.0/x86_64/perl-5.8.7-3.5.20060mlcs4.x86_64.rpm
efccb85f0e99076d8f7ebd9a63a22cd0
corporate/4.0/x86_64/perl-base-5.8.7-3.5.20060mlcs4.x86_64.rpm
32d3fa0d8c5e2cdce13420959f2352fd
corporate/4.0/x86_64/perl-devel-5.8.7-3.5.20060mlcs4.x86_64.rpm
fb292ea2073219978d11234102949ecc
corporate/4.0/x86_64/perl-doc-5.8.7-3.5.20060mlcs4.x86_64.rpm
182f5f98dfbbaf04d4c989b174541767
corporate/4.0/x86_64/perl-suid-5.8.7-3.5.20060mlcs4.x86_64.rpm
f0b4a8566ad3a8a374e49b33694f6a72
corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
c64dd4baae4ded5ce516561017c48782 mnf/2.0/i586/perl-5.8.3-5.8.M20mdk.i586.rpm
dba8966ad830867b6fe22b933353df32
mnf/2.0/i586/perl-base-5.8.3-5.8.M20mdk.i586.rpm
f2433e06a5fa097e31046f71190e29ce
mnf/2.0/i586/perl-devel-5.8.3-5.8.M20mdk.i586.rpm
33d19b22f598e5c72dd5d1ef9ac3e4e0
mnf/2.0/i586/perl-doc-5.8.3-5.8.M20mdk.i586.rpm
90c1b9688da6da419fc85e947a279acc mnf/2.0/SRPMS/perl-5.8.3-5.8.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIJpX7mqjQ0CJFipgRAlOHAKDJlrfLWmbxBMPnWMAvTl1yabLWJwCghP42
ryxkDv8oh5J9zog3IJZlfh4=
=ytAJ
-----END PGP SIGNATURE-----


------------=_1210499735-11275-4392
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1210499735-11275-4392--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung