Gentoo Archives: gentoo-announce

From: Mikle Kolyada <zlogene@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201401-33 ] Perl Digest-Base module: Arbitrary code execution
Date: Wed, 29 Jan 2014 08:32:00
Message-Id: 52E8BD35.6010301@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201401-33
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Perl Digest-Base module: Arbitrary code execution
9 Date: January 29, 2014
10 Bugs: #385487
11 ID: 201401-33
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been found in the Digest-Base Perl module, allowing
19 remote attackers to execute arbitrary code.
20
21 Background
22 ==========
23
24 Digest-Base is a set of Perl modules that calculate message digests
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 perl-core/digest-base < 1.170.0 >= 1.170.0
33
34 Description
35 ===========
36
37 The vulnerability is caused due to the "Digest->new()" function not
38 properly sanitising input before using it in an "eval()" call.
39
40 Impact
41 ======
42
43 The vulnerability might allow an attacker to execute arbitrary code.
44
45 Workaround
46 ==========
47
48 There is no known workaround at this time.
49
50 Resolution
51 ==========
52
53 All Digest-Base module users should upgrade to the latest version:
54
55 # emerge --sync
56 # emerge --ask --oneshot --verbose ">=perl-core/digest-base-1.170.0"
57
58 References
59 ==========
60
61 [ 1 ] CVE-2011-3597
62 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3597
63
64 Availability
65 ============
66
67 This GLSA and any updates to it are available for viewing at
68 the Gentoo Security Website:
69
70 http://security.gentoo.org/glsa/glsa-201401-33.xml
71
72 Concerns?
73 =========
74
75 Security is a primary focus of Gentoo Linux and ensuring the
76 confidentiality and security of our users' machines is of utmost
77 importance to us. Any security concerns should be addressed to
78 security@g.o or alternatively, you may file a bug at
79 https://bugs.gentoo.org.
80
81 License
82 =======
83
84 Copyright 2014 Gentoo Foundation, Inc; referenced text
85 belongs to its owner(s).
86
87 The contents of this document are licensed under the
88 Creative Commons - Attribution / Share Alike license.
89
90 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature