<<< Date Index >>>     <<< Thread Index >>>

[ MDVSA-2008:100 ] - Updated perl packages fix denial of service vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:100
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : perl
 Date    : May 11, 2008
 Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A double free vulnerability in Perl 5.8.8 and earlier versions,
 allows context-dependent attackers to cause a denial of service
 (memory corruption and crash) via a crafted regular expression
 containing UTF8 characters.
 
 The updated packages have been patched to prevent this.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 664ca790014a73481d8e0432652c9b0b  2007.1/i586/perl-5.8.8-10.2mdv2007.1.i586.rpm
 ce416fc49eddf4f744be678fe7576e10  
2007.1/i586/perl-base-5.8.8-10.2mdv2007.1.i586.rpm
 a20d1e14e1aadd3f863d34888211ace1  
2007.1/i586/perl-devel-5.8.8-10.2mdv2007.1.i586.rpm
 a7f55a0ecd6be1878655b2266046a4d3  
2007.1/i586/perl-doc-5.8.8-10.2mdv2007.1.i586.rpm
 b79a30665df6cf6094bfa0aad344eed4  
2007.1/i586/perl-suid-5.8.8-10.2mdv2007.1.i586.rpm 
 86ce0e141f4ab82250ae6e247f45d2fc  2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 225cbadc92ce47b0843903a64a63d79d  
2007.1/x86_64/perl-5.8.8-10.2mdv2007.1.x86_64.rpm
 a77595f32f641e78794d2fcb72fe120a  
2007.1/x86_64/perl-base-5.8.8-10.2mdv2007.1.x86_64.rpm
 0266b1964b67c057be7393976c0d2f5e  
2007.1/x86_64/perl-devel-5.8.8-10.2mdv2007.1.x86_64.rpm
 0211288533d2ead15e2958b4703a9376  
2007.1/x86_64/perl-doc-5.8.8-10.2mdv2007.1.x86_64.rpm
 7df3c3084401b81c1733c6d83bc178b9  
2007.1/x86_64/perl-suid-5.8.8-10.2mdv2007.1.x86_64.rpm 
 86ce0e141f4ab82250ae6e247f45d2fc  2007.1/SRPMS/perl-5.8.8-10.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 3f698bfd85b3b40498f6116513405310  2008.0/i586/perl-5.8.8-12.2mdv2008.0.i586.rpm
 fd8ba80974608688d9722ad3a4f2ae76  
2008.0/i586/perl-base-5.8.8-12.2mdv2008.0.i586.rpm
 efbcf93b4378123a7d5b7f7e14a0dc25  
2008.0/i586/perl-devel-5.8.8-12.2mdv2008.0.i586.rpm
 5e4b82208d8b58deef43ebc40da1a216  
2008.0/i586/perl-doc-5.8.8-12.2mdv2008.0.i586.rpm
 a15614b2e52a0af5fdbac084b96c00cf  
2008.0/i586/perl-suid-5.8.8-12.2mdv2008.0.i586.rpm 
 8558ac9e417118785e894e64ff07d04c  2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 6710a7820500860d6e3034ac1402106c  
2008.0/x86_64/perl-5.8.8-12.2mdv2008.0.x86_64.rpm
 79d39d3ddbfbfc6b3b0547d5e927b1e8  
2008.0/x86_64/perl-base-5.8.8-12.2mdv2008.0.x86_64.rpm
 2aeb84fbea01b4ec1204614c860d254b  
2008.0/x86_64/perl-devel-5.8.8-12.2mdv2008.0.x86_64.rpm
 4fe90113442934652ebae0a7f0a3edca  
2008.0/x86_64/perl-doc-5.8.8-12.2mdv2008.0.x86_64.rpm
 a112b5b5156c390003b1efa335deecb5  
2008.0/x86_64/perl-suid-5.8.8-12.2mdv2008.0.x86_64.rpm 
 8558ac9e417118785e894e64ff07d04c  2008.0/SRPMS/perl-5.8.8-12.2mdv2008.0.src.rpm

 Corporate 3.0:
 6541cd09e61b24557dc2a6da79a26e75  
corporate/3.0/i586/perl-5.8.3-5.8.C30mdk.i586.rpm
 3361f8b0bcc7264024d8e8b230ef4046  
corporate/3.0/i586/perl-base-5.8.3-5.8.C30mdk.i586.rpm
 8d3bdf4209f003efc7314c62313a1868  
corporate/3.0/i586/perl-devel-5.8.3-5.8.C30mdk.i586.rpm
 05b2077f7c2826a738495bb3b51493fb  
corporate/3.0/i586/perl-doc-5.8.3-5.8.C30mdk.i586.rpm 
 717f3c1eb7aea5ccbb7c34015a1d1a14  
corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 88004594708e21886759c473aa7438a9  
corporate/3.0/x86_64/perl-5.8.3-5.8.C30mdk.x86_64.rpm
 836fd16b824a68e5ae9ee38dcc6dda98  
corporate/3.0/x86_64/perl-base-5.8.3-5.8.C30mdk.x86_64.rpm
 633826ab46f461fbdb4e48deb662b50b  
corporate/3.0/x86_64/perl-devel-5.8.3-5.8.C30mdk.x86_64.rpm
 9f8c8ea413e5558c236c29963555d89b  
corporate/3.0/x86_64/perl-doc-5.8.3-5.8.C30mdk.x86_64.rpm 
 717f3c1eb7aea5ccbb7c34015a1d1a14  
corporate/3.0/SRPMS/perl-5.8.3-5.8.C30mdk.src.rpm

 Corporate 4.0:
 02c043c39340814bf586083b584dbbd9  
corporate/4.0/i586/perl-5.8.7-3.5.20060mlcs4.i586.rpm
 24e5aa7523525378c319350cb867b4b8  
corporate/4.0/i586/perl-base-5.8.7-3.5.20060mlcs4.i586.rpm
 1cad5220ac2bc693ba9fc60a6406b72b  
corporate/4.0/i586/perl-devel-5.8.7-3.5.20060mlcs4.i586.rpm
 62dcd4a7f4c6075348a08dadc9454dfd  
corporate/4.0/i586/perl-doc-5.8.7-3.5.20060mlcs4.i586.rpm
 6327e773b81b1f47f679ec0cae4ce2d2  
corporate/4.0/i586/perl-suid-5.8.7-3.5.20060mlcs4.i586.rpm 
 f0b4a8566ad3a8a374e49b33694f6a72  
corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 6bf5bc56705827f3b4dbc01e8f963491  
corporate/4.0/x86_64/perl-5.8.7-3.5.20060mlcs4.x86_64.rpm
 efccb85f0e99076d8f7ebd9a63a22cd0  
corporate/4.0/x86_64/perl-base-5.8.7-3.5.20060mlcs4.x86_64.rpm
 32d3fa0d8c5e2cdce13420959f2352fd  
corporate/4.0/x86_64/perl-devel-5.8.7-3.5.20060mlcs4.x86_64.rpm
 fb292ea2073219978d11234102949ecc  
corporate/4.0/x86_64/perl-doc-5.8.7-3.5.20060mlcs4.x86_64.rpm
 182f5f98dfbbaf04d4c989b174541767  
corporate/4.0/x86_64/perl-suid-5.8.7-3.5.20060mlcs4.x86_64.rpm 
 f0b4a8566ad3a8a374e49b33694f6a72  
corporate/4.0/SRPMS/perl-5.8.7-3.5.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 c64dd4baae4ded5ce516561017c48782  mnf/2.0/i586/perl-5.8.3-5.8.M20mdk.i586.rpm
 dba8966ad830867b6fe22b933353df32  
mnf/2.0/i586/perl-base-5.8.3-5.8.M20mdk.i586.rpm
 f2433e06a5fa097e31046f71190e29ce  
mnf/2.0/i586/perl-devel-5.8.3-5.8.M20mdk.i586.rpm
 33d19b22f598e5c72dd5d1ef9ac3e4e0  
mnf/2.0/i586/perl-doc-5.8.3-5.8.M20mdk.i586.rpm 
 90c1b9688da6da419fc85e947a279acc  mnf/2.0/SRPMS/perl-5.8.3-5.8.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIJpX7mqjQ0CJFipgRAlOHAKDJlrfLWmbxBMPnWMAvTl1yabLWJwCghP42
ryxkDv8oh5J9zog3IJZlfh4=
=ytAJ
-----END PGP SIGNATURE-----