Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202411-09

Gentoo Linux Security Advisory 202411-9 - Multiple vulnerabilities have been discovered in Perl, the worst of which can lead to arbitrary code execution. Versions greater than or equal to 5.38.2 are affected.

Packet Storm
#vulnerability#web#mac#linux#perl

Gentoo Linux Security Advisory GLSA 202411-09


                                       https://security.gentoo.org/  

Severity: Normal
Title: Perl: Multiple Vulnerabilities
Date: November 17, 2024
Bugs: #807307, #905296, #918612
ID: 202411-09


Synopsis

Multiple vulnerabilities have been discovered in Perl, the worst of
which can lead to arbitrary code execution.

Background

Perl is Larry Wall’s Practical Extraction and Report Language.

Affected packages

Package Vulnerable Unaffected


dev-lang/perl < 5.38.2 >= 5.38.2

Description

Multiple vulnerabilities have been discovered in Perl. Please review the
CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Perl users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=dev-lang/perl-5.38.2”

References

[ 1 ] CVE-2021-36770
https://nvd.nist.gov/vuln/detail/CVE-2021-36770
[ 2 ] CVE-2023-31486
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
[ 3 ] CVE-2023-47038
https://nvd.nist.gov/vuln/detail/CVE-2023-47038

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202411-09

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Red Hat Security Advisory 2024-4430-03

Red Hat Security Advisory 2024-4430-03 - An update for perl-HTTP-Tiny is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.

Ubuntu Security Notice USN-6517-1

Ubuntu Security Notice 6517-1 - It was discovered that Perl incorrectly handled printing certain warning messages. An attacker could possibly use this issue to cause Perl to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS. Nathan Mills discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code.

Red Hat Security Advisory 2023-7174-01

Red Hat Security Advisory 2023-7174-01 - An update for perl-HTTP-Tiny is now available for Red Hat Enterprise Linux 8.

CVE-2023-31486: security - Perl's HTTP::Tiny has insecure TLS cert default, affecting CPAN.pm and other modules

HTTP::Tiny 0.082, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Packet Storm: Latest News

Pyload Remote Code Execution