U radu programskog paketa perl-CGI-Simple, za operacijske sustave Fedora 13 i 14, uočena su tri sigurnosna propusta. Riječ je o Perl modulu za implementaciju sučelja za razvoj CGI skripti. Propusti su posljedica nepravilnosti u radu funkcija "header()" i "multipart_init()", te nespecificirane ranjivosti u modulu "CGI.pm". Napadaču omogućuju umetanje proizvoljnih HTTP zaglavlja i izvođenje tzv. "HTTP response splitting" napada. Svim se korisnicima ranjivog paketa savjetuje instalacija nadogradnje.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-0653
2011-01-21 22:14:28
--------------------------------------------------------------------------------
Name : perl-CGI-Simple
Product : Fedora 14
Version : 1.113
Release : 1.fc14
URL : http://search.cpan.org/dist/CGI-Simple/
Summary : Simple totally OO CGI interface that is CGI.pm compliant
Description :
Simple totally OO CGI interface that is CGI.pm compliant.
--------------------------------------------------------------------------------
Update Information:
Update to 1.113 and apply additional patch to resolve CVE-2010-4410.
Fix boundary to use randomized value as opposed to hardcoded value.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jan 21 2011 Tom Callaway <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.113-1
- Update to 1.113, apply additional patch to fully resolve CVE-2010-4411
* Wed Dec 1 2010 Tom "spot" Callaway <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.112-2
- patch for randomizing boundary (bz 658973)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #658976 - perl-CGI, perl-CGI-Simple: CVE-2010-2761 -- hardcoded
value of the MIME boundary string in multipart/x-mixed-replace content,
CVE-2010-4410 -- CRLF injection vulnerability in the header function
https://bugzilla.redhat.com/show_bug.cgi?id=658976
[ 2 ] Bug #658970 - perl-CGI-Simple: CRLF injection vulnerability via a
crafted URL
https://bugzilla.redhat.com/show_bug.cgi?id=658970
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update perl-CGI-Simple' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-0631
2011-01-21 22:13:26
--------------------------------------------------------------------------------
Name : perl-CGI-Simple
Product : Fedora 13
Version : 1.113
Release : 1.fc13
URL : http://search.cpan.org/dist/CGI-Simple/
Summary : Simple totally OO CGI interface that is CGI.pm compliant
Description :
Simple totally OO CGI interface that is CGI.pm compliant.
--------------------------------------------------------------------------------
Update Information:
Update to 1.113 and apply additional patch to resolve CVE-2010-4410.
Fix boundary to use randomized value as opposed to hardcoded value.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Jan 21 2011 Tom Callaway <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.113-1
- Update to 1.113, apply additional patch to fully resolve CVE-2010-4411
* Wed Dec 1 2010 Tom "spot" Callaway <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.112-2
- patch for randomizing boundary (bz 658973)
* Mon Jul 12 2010 Tom "spot" Callaway <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.112-1
- update to 1.112
* Fri Apr 30 2010 Marcela Maslanova <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 1.108-4
- Mass rebuild with perl-5.12.0
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #658976 - perl-CGI, perl-CGI-Simple: CVE-2010-2761 -- hardcoded
value of the MIME boundary string in multipart/x-mixed-replace content,
CVE-2010-4410 -- CRLF injection vulnerability in the header function
https://bugzilla.redhat.com/show_bug.cgi?id=658976
[ 2 ] Bug #658970 - perl-CGI-Simple: CRLF injection vulnerability via a
crafted URL
https://bugzilla.redhat.com/show_bug.cgi?id=658970
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update perl-CGI-Simple' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke