Unsichere Verwendung temporärer Dateien in perl-HTTP-Body
ID: | openSUSE-SU-2014:0433-1 |
Distribution: | SUSE |
Plattformen: | openSUSE 12.3, openSUSE 13.1 |
Datum: | Di, 25. März 2014, 12:34 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4407 |
Applikationen: | perl-HTTP-Body |
Originalnachricht |
|
openSUSE Security Update: perl-HTTP-Body: update to 1.19 release with security fixes ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0433-1 Rating: important References: #844951 Cross-References: CVE-2013-4407 Affected Products: openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: perl-HTTP-Body was updated to 1.19 and also received a security fix for a potential remote code injection when upload files. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-247 - openSUSE 12.3: zypper in -t patch openSUSE-2014-247 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (noarch): perl-HTTP-Body-1.19-2.4.1 - openSUSE 12.3 (noarch): perl-HTTP-Body-1.19-4.4.1 References: http://support.novell.com/security/cve/CVE-2013-4407.html https://bugzilla.novell.com/844951 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org |