ports/57316: Safe.pm security hole in japanese/perl, as well as 4.x base system's perl
IIJIMA Hiromitsu
delmonta at ht.sakura.ne.jp
Sun Sep 28 14:50:27 UTC 2003
>Number: 57316
>Category: ports
>Synopsis: Safe.pm security hole in japanese/perl, as well as 4.x base system's perl
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Sun Sep 28 07:50:25 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator: IIJIMA Hiromitsu
>Release: FreeBSD 4.7-RELEASE-p3 i386
>Organization:
DENNOU GEDOU GAKKAI, N. D. D. http://www.dennougedougakkai-ndd.org
>Environment:
System: FreeBSD sodans.usata.org 4.7-RELEASE-p3 FreeBSD 4.7-RELEASE-p3 #0: Wed Jan 22 14:50:19 JST 2003 root at www.my.domain:/usr/src/sys/compile/RENTALv6 i386
Userland is upgraded to -p16, while the kernel is still -p3.
>Description:
Safe.pm in ports/japanese/perl5 (perl 5.005_03 plus Japanese patch)
has a security hole labelled as CAN-2002-1323.
For more information, see the websites at:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1323
http://groups.google.com/groups?threadm=rt-17744-39131.3.96370682846239%40bugs6.perl.org
[NOTE] ports/lang/perl5 (perl 5.6.1) and ports/lang/perl5.8 (perl 5.8.0)
are not affected, since they have files/patch-Safe.pm in the ports.
FreeBSD 4.x base system's perl is also affected, so I have sent
another PR labelled as bin/57315.
>How-To-Repeat:
I tried the exploit code at Google Groups archive, but is not successful.
>Fix:
Apply ports/lang/perl5/patch-Safe.pm to ports/japanese/perl5.
It applies to perl 5.005_03 with no problem.
ports/lang/perl5.8/patch-Safe.pm does not apply to perl 5.005_03,
since it is an upgrade from Safe.pm 2.07 to 2.09 while perl 5.005_03
has Safe.pm 2.06.
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list