USN-16-1: perl vulnerabilities

Publication date

3 November 2004

Overview

perl vulnerabilities

Releases


Details

Recently, Trustix Secure Linux discovered some vulnerabilities in the
perl package. The utility “instmodsh”, the Perl package “PPPort.pm”,
and several test scripts (which are not shipped and only used during
build) created temporary files in an insecure way, which could allow a
symlink attack to create or overwrite arbitrary files with the
privileges of the user invoking the program, or building the perl
package, respectively.

Recently, Trustix Secure Linux discovered some vulnerabilities in the
perl package. The utility “instmodsh”, the Perl package “PPPort.pm”,
and several test scripts (which are not shipped and only used during
build) created temporary files in an insecure way, which could allow a
symlink attack to create or overwrite arbitrary files with the
privileges of the user invoking the program, or building the perl
package, respectively.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
4.10 warty perl – 

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›