=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN595
_____________________________________________________________________

DATE                      : 06/10/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running perl.

======================================================================

- - ---------------------------------------------------------------------
                    Red Hat Security Advisory

Synopsis:          Low: perl security update
Advisory ID:       RHSA-2005:674-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-674.html
Issue date:        2005-10-05
Updated on:        2005-10-05
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0448
- - ---------------------------------------------------------------------

1. Summary:

Updated Perl packages that fix security issues and contain several bug
fixes are now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Perl is a high-level programming language commonly used for system
administration utilities and Web programming.

Paul Szabo discovered a bug in the way Perl's File::Path::rmtree module
removed directory trees. If a local user has write permissions to a
subdirectory within the tree being removed by File::Path::rmtree, it is
possible for them to create setuid binary files. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0448
to this issue.

This update also addresses the following issues:

- - -- Perl interpreter caused a segmentation fault when environment
changes occurred during runtime.

- - -- Code in lib/FindBin contained a regression that caused problems with
  MRTG software package.

- - -- Perl incorrectly declared it provides an FCGI interface where it in fact
   did not.

Users of Perl are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

     up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

127023 - perl fails "lib/FindBin" test (breaks MRTG)
148848 - Packing fault with perl and FCGI
155888 - perl-suidperl package has an extra .1 release suffix
157694 - CAN-2005-0448 perl File::Path.pm rmtree race condition


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5  perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4  perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

ppc:
89dad8dbc4dc1ca219ad353c0ebce105  perl-5.8.5-16.RHEL4.ppc.rpm
d768e18d710ed0ddf9ff928cd7b62991  perl-suidperl-5.8.5-16.RHEL4.ppc.rpm

s390:
d2b9782e99e123ada2a42c0719d4286b  perl-5.8.5-16.RHEL4.s390.rpm
786148799901a80afa9ae8ecd8a08c88  perl-suidperl-5.8.5-16.RHEL4.s390.rpm

s390x:
d2a24c5fbc21634c1242477a1f959df8  perl-5.8.5-16.RHEL4.s390x.rpm
ef1e3ff9dfeb8bb39807841fdabbc3c9  perl-suidperl-5.8.5-16.RHEL4.s390x.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5  perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4  perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-16.RHEL4.src.rpm
680ce92a9da6cccf344e1b13123d9aaa  perl-5.8.5-16.RHEL4.src.rpm

i386:
9ec1570c81d4034b22e5b4e10d1b9e18  perl-5.8.5-16.RHEL4.i386.rpm
cfe9e85adc4c8faa977e56f3ff06abd3  perl-suidperl-5.8.5-16.RHEL4.i386.rpm

ia64:
453283cb6c5d392580a318ddf0a5fbb5  perl-5.8.5-16.RHEL4.ia64.rpm
9f01a4ef79fc601ac34892d5df64a7a4  perl-suidperl-5.8.5-16.RHEL4.ia64.rpm

x86_64:
0d14d35ee0f24120c7e3e36e17ee3ea1  perl-5.8.5-16.RHEL4.x86_64.rpm
41c3d79fba9d74c3e7da6f57d4d167ee  perl-suidperl-5.8.5-16.RHEL4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================




