Red Hat 9062 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Low: perl security update
Advisory ID: RHSA-2005:674-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-674.html
Issue date: 2005-10-05
Updated on: 2005-10-05
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0448
- ---------------------------------------------------------------------

1. Summary:

Updated Perl packages that fix security issues and contain several bug
fixes are now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Perl is a high-level programming language commonly used for system
administration utilities and Web programming.

Paul Szabo discovered a bug in the way Perl's File::Path::rmtree module
removed directory trees. If a local user has write permissions to a
subdirectory within the tree being removed by File::Path::rmtree, it is
possible for them to create setuid binary files. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0448
to this issue.

This update also addresses the following issues:

- -- Perl interpreter caused a segmentation fault when environment
changes occurred during runtime.

- -- Code in lib/FindBin contained a regression that caused problems with
MRTG software package.

- -- Perl incorrectly declared it provides an FCGI interface where it in fact
did not.

Users of Perl are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

127023 - perl fails "lib/FindBin" test (breaks MRTG)
148848 - Packing fault with perl and FCGI
155888 - perl-suidperl package has an extra .1 release suffix
157694 - CAN-2005-0448 perl File::Path.pm rmtree race condition


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5 perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4 perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

ppc:
89dad8dbc4dc1ca219ad353c0ebce105 perl-5.8.5-16.RHEL4.ppc.rpm
d768e18d710ed0ddf9ff928cd7b62991 perl-suidperl-5.8.5-16.RHEL4.ppc.rpm

s390:
d2b9782e99e123ada2a42c0719d4286b perl-5.8.5-16.RHEL4.s390.rpm
786148799901a80afa9ae8ecd8a08c88 perl-suidperl-5.8.5-16.RHEL4.s390.rpm

s390x:
d2a24c5fbc21634c1242477a1f959df8 perl-5.8.5-16.RHEL4.s390x.rpm
ef1e3ff9dfeb8bb39807841fdabbc3c9 perl-suidperl-5.8.5-16.RHEL4.s390x.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5 perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4 perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18 perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3 perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5 perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4 perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1 perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFDQ9moXlSAg2UNWIIRAvZgAKC90c4MtVjeD1LvpPl/8MQhNMN3LwCggjV0
p5p/44d68tnapR2H6Lh5Yyg=
=/x9M
-----END PGP SIGNATURE-----