-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
ESB-98.034 -- Red Hat Linux Bulletin
Vulnerability in perl symlinks
11 March 1998
Red Hat Software, Inc. has released the following advisory concerning the
vulnerability in perl symlinks. All versions of perl for Red Hat Linux
are vulnerable to /tmp symlink attacks.
The following security bulletin is provided as a service to AUSCERT's
members. As AUSCERT did not write this document, AUSCERT has had no
control over its content. As such, the decision to use any or all of this
information is the responsibility of each user or organisation, and should
be done so in accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It will
not be updated when the original bulletin is. If downloading at a later
date, it is recommended that the bulletin is retrieved from the original
authors to ensure that the information is still current.
Contact information for Red Hat Software is included below. If you have any
questions or need further information, please contact them directly.
For more information from Red Hat Software visit: http://www.redhat.com
Previous advisories and external security bulletins can be retrieved from:
If you believe that your system has been compromised, contact AUSCERT or your
representative in FIRST (Forum of Incident Response and Security Teams).
Internet Email: firstname.lastname@example.org
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AUSCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
Facsimile: (07) 3365 7031
- --------------------------BEGIN INCLUDED TEXT--------------------
All versions of perl for Red Hat Linux have /tmp symlink attacks. New
packages are available for Red Hat 4.2 and Red Hat 5.0 which fix these
problems. All users of Red Hat Linux are encouraged to upgrade to the
new perl releases immediately. As always, these packages have been signed
with the Red Hat PGP key. Thanks to the contributors of BUGTRAQ for finding
and fixing this bug.
Red Hat 5.0
rpm -Uvh ftp://ftp.redhat.com/updates/5.0/i386/perl-5.004-3.i386.rpm
rpm -Uvh ftp://ftp.redhat.com/updates/5.0/alpha/perl-5.004-3.alpha.rpm
Red Hat 4.2
rpm -Uvh ftp://ftp.redhat.com/updates/4.2/i386/perl-5.004-0.1.i386.rpm
rpm -Uvh ftp://ftp.redhat.com/updates/4.2/alpha/perl-5.004-0.1.alpha.rpm
rpm -Uvh ftp://ftp.redhat.com/updates/4.2/sparc/perl-5.004-0.1.sparc.rpm
- --------------------------END INCLUDED TEXT--------------------
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----