Red Hat 9038 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: perl security update
Advisory ID: RHSA-2006:0605-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0605.html
Issue date: 2006-08-10
Updated on: 2006-08-10
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-3813
- ---------------------------------------------------------------------

1. Summary:

Updated Perl packages that fix security a security issue are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Perl is a high-level programming language commonly used for system
administration utilities and Web programming.

Kevin Finisterre discovered a flaw in sperl, the Perl setuid wrapper, which
can cause debugging information to be logged to arbitrary files. By setting
an environment variable, a local user could cause sperl to create, as root,
files with arbitrary filenames, or append the debugging information to
existing files. (CVE-2005-0155)

A fix for this issue was first included in the update RHSA-2005:103
released in February 2005. However the patch to correct this issue was
dropped from the update RHSA-2005:674 made in October 2005. This
regression has been assigned CVE-2006-3813.

Users of Perl are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65 perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837 perl-suidperl-5.8.5-36.RHEL4.i386.rpm

ia64:
cd08f7b4cb850213d2757bfada9dd956 perl-5.8.5-36.RHEL4.ia64.rpm
28edd44703901cc219c0d74938d2b5a7 perl-debuginfo-5.8.5-36.RHEL4.ia64.rpm
35b7ff4152135396feb0b0083831247b perl-suidperl-5.8.5-36.RHEL4.ia64.rpm

ppc:
a77b3207552f5e625f329b61e09577b5 perl-5.8.5-36.RHEL4.ppc.rpm
9e819e0cdbb412ea396b320ce28270db perl-debuginfo-5.8.5-36.RHEL4.ppc.rpm
458cf86bb3db0da22ae6378485deffac perl-suidperl-5.8.5-36.RHEL4.ppc.rpm

s390:
519fc6b7fd84a91a472a670727c55de3 perl-5.8.5-36.RHEL4.s390.rpm
1b993ae54688004ee4dc187bf2fc9e70 perl-debuginfo-5.8.5-36.RHEL4.s390.rpm
b5dc4f4882b412b6260f24ab2b85fdda perl-suidperl-5.8.5-36.RHEL4.s390.rpm

s390x:
95fefe02a5cea938b95be2b995ae8833 perl-5.8.5-36.RHEL4.s390x.rpm
0fc353a5d0fb16e50504d69fad0b950c perl-debuginfo-5.8.5-36.RHEL4.s390x.rpm
b146373683877b421333b4edd3e2c1ff perl-suidperl-5.8.5-36.RHEL4.s390x.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83 perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7 perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65 perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837 perl-suidperl-5.8.5-36.RHEL4.i386.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83 perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7 perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65 perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837 perl-suidperl-5.8.5-36.RHEL4.i386.rpm

ia64:
cd08f7b4cb850213d2757bfada9dd956 perl-5.8.5-36.RHEL4.ia64.rpm
28edd44703901cc219c0d74938d2b5a7 perl-debuginfo-5.8.5-36.RHEL4.ia64.rpm
35b7ff4152135396feb0b0083831247b perl-suidperl-5.8.5-36.RHEL4.ia64.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83 perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7 perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65 perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837 perl-suidperl-5.8.5-36.RHEL4.i386.rpm

ia64:
cd08f7b4cb850213d2757bfada9dd956 perl-5.8.5-36.RHEL4.ia64.rpm
28edd44703901cc219c0d74938d2b5a7 perl-debuginfo-5.8.5-36.RHEL4.ia64.rpm
35b7ff4152135396feb0b0083831247b perl-suidperl-5.8.5-36.RHEL4.ia64.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83 perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7 perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3813
http://rhn.redhat.com/errata/RHSA-2005-105.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFE26bYXlSAg2UNWIIRAjztAJ4mr/MDyQzZNUCDMzz/cBq4ZOYfpwCeJgwb
rGnPNySNMgwIK8OwM4UV75k=
=Cf9L
-----END PGP SIGNATURE-----