what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2011-091

Mandriva Linux Security Advisory 2011-091
Posted May 18, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-091 - The ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

tags | advisory, perl
systems | linux, mandriva
advisories | CVE-2011-1487
SHA-256 | 3634e6a88e6413829938344c137e79d7f109bf855b345e68ed79c1b07e32514e

Mandriva Linux Security Advisory 2011-091

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:091
http://www.mandriva.com/security/
_______________________________________________________________________

Package : perl
Date : May 18, 2011
Affected: 2009.0, 2010.1, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in perl:

The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl
5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11,
do not apply the taint attribute to the return value upon processing
tainted input, which might allow context-dependent attackers to bypass
the taint protection mechanism via a crafted string (CVE-2011-1487).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1487
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
2a65372592d0aa2c0cef14fa13ba5077 2009.0/i586/perl-5.10.0-25.3mdv2009.0.i586.rpm
6f58332a55ba293deadfbb80827f3df2 2009.0/i586/perl-base-5.10.0-25.3mdv2009.0.i586.rpm
9b84814dc9335dfcb0dc3ad402ba289c 2009.0/i586/perl-devel-5.10.0-25.3mdv2009.0.i586.rpm
15809dc26b65fb45bd2990890da238c8 2009.0/i586/perl-doc-5.10.0-25.3mdv2009.0.i586.rpm
7ddd98eb40b0fc7665b6c9ac031726c4 2009.0/i586/perl-suid-5.10.0-25.3mdv2009.0.i586.rpm
1f77907edc97bdcf531167624d550f28 2009.0/SRPMS/perl-5.10.0-25.3mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
d2967b835c46d4a50799f687e63537c2 2009.0/x86_64/perl-5.10.0-25.3mdv2009.0.x86_64.rpm
21fb8ac662f6f9cc95e144799c3eeea7 2009.0/x86_64/perl-base-5.10.0-25.3mdv2009.0.x86_64.rpm
0307aa3f955e16707bff7eaec5ca57a5 2009.0/x86_64/perl-devel-5.10.0-25.3mdv2009.0.x86_64.rpm
958e3ebf4bb38459ff3d21d38119df68 2009.0/x86_64/perl-doc-5.10.0-25.3mdv2009.0.x86_64.rpm
a14c1467114914387ceddf49093f6bc5 2009.0/x86_64/perl-suid-5.10.0-25.3mdv2009.0.x86_64.rpm
1f77907edc97bdcf531167624d550f28 2009.0/SRPMS/perl-5.10.0-25.3mdv2009.0.src.rpm

Mandriva Linux 2010.1:
6a0a7a6bda22faddbaddb2c66c1b11be 2010.1/i586/perl-5.10.1-10.1mdv2010.2.i586.rpm
e798818652a1441aaad1f0add4af3fc2 2010.1/i586/perl-base-5.10.1-10.1mdv2010.2.i586.rpm
e05a85dacf0addcc34a80f785778ffe7 2010.1/i586/perl-devel-5.10.1-10.1mdv2010.2.i586.rpm
881b5bfbc78edeef78d3e69783c9583b 2010.1/i586/perl-doc-5.10.1-10.1mdv2010.2.i586.rpm
c96eb3207cb689bdf7bdd25d91198c00 2010.1/i586/perl-suid-5.10.1-10.1mdv2010.2.i586.rpm
7f53e901f0d6a3298da34c4886b3002a 2010.1/SRPMS/perl-5.10.1-10.1mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
c532e3e57436bb60698a64e7cd0f0865 2010.1/x86_64/perl-5.10.1-10.1mdv2010.2.x86_64.rpm
9ee737d8a025526d9148b45459e5366c 2010.1/x86_64/perl-base-5.10.1-10.1mdv2010.2.x86_64.rpm
523c62e21eba8794b02e1de16e9ea7ef 2010.1/x86_64/perl-devel-5.10.1-10.1mdv2010.2.x86_64.rpm
e8bc7352e949fe1633f49243838a91e6 2010.1/x86_64/perl-doc-5.10.1-10.1mdv2010.2.x86_64.rpm
74ffa4ed9f3830c2a1994e0c7ccbb462 2010.1/x86_64/perl-suid-5.10.1-10.1mdv2010.2.x86_64.rpm
7f53e901f0d6a3298da34c4886b3002a 2010.1/SRPMS/perl-5.10.1-10.1mdv2010.2.src.rpm

Mandriva Enterprise Server 5:
184b241715dfb45ab0462b4c162a7f80 mes5/i586/perl-5.10.0-25.3mdvmes5.2.i586.rpm
3a1b3fcdc01c9e057ad9e188948d7e4e mes5/i586/perl-base-5.10.0-25.3mdvmes5.2.i586.rpm
a6560d89ae718928aecbb8084dfc37d6 mes5/i586/perl-devel-5.10.0-25.3mdvmes5.2.i586.rpm
beff68da2c44504c13eaa935f1febd94 mes5/i586/perl-doc-5.10.0-25.3mdvmes5.2.i586.rpm
25fa94fb16affee8234d0b393318238c mes5/i586/perl-suid-5.10.0-25.3mdvmes5.2.i586.rpm
b7595e3b4c5c860bd6cde2d9148e36a7 mes5/SRPMS/perl-5.10.0-25.3mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
9cb402b02a1535c0d6fb84d32189a325 mes5/x86_64/perl-5.10.0-25.3mdvmes5.2.x86_64.rpm
f57820d42b7c7b6371cb8d7d45f83e11 mes5/x86_64/perl-base-5.10.0-25.3mdvmes5.2.x86_64.rpm
1711e6bcdcea29f57481f20dd1f8e185 mes5/x86_64/perl-devel-5.10.0-25.3mdvmes5.2.x86_64.rpm
d7ecd8441d5c9ed909c7ad8e084469b3 mes5/x86_64/perl-doc-5.10.0-25.3mdvmes5.2.x86_64.rpm
4549c6ee80c14e38a1a85fff5a262ec4 mes5/x86_64/perl-suid-5.10.0-25.3mdvmes5.2.x86_64.rpm
b7595e3b4c5c860bd6cde2d9148e36a7 mes5/SRPMS/perl-5.10.0-25.3mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFN04kBmqjQ0CJFipgRAhhmAKCJ6p7gXv/dw58YZnh3ApL+EthUJQCgr/sz
/InIkPKUNVJBsEI7nWnLx3w=
=9jqJ
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close