-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2006.0578 -- [RedHat]
             Red Hat update for Perl fixes security regression
                              11 August 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Perl
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux AS/ES/WS 4
                      Red Hat Enterprise Linux Desktop 4
Impact:               Create Arbitrary Files
                      Modify Arbitrary Files
Access:               Existing Account
CVE Names:            CVE-2006-3813 CVE-2005-0155

Ref:                  ESB-2005.0110

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2006-0605.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: perl security update
Advisory ID:       RHSA-2006:0605-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0605.html
Issue date:        2006-08-10
Updated on:        2006-08-10
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-3813 
- - ---------------------------------------------------------------------

1. Summary:

Updated Perl packages that fix security a security issue are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

Perl is a high-level programming language commonly used for system
administration utilities and Web programming.

Kevin Finisterre discovered a flaw in sperl, the Perl setuid wrapper, which
can cause debugging information to be logged to arbitrary files. By setting
an environment variable, a local user could cause sperl to create, as root,
files with arbitrary filenames, or append the debugging information to
existing files. (CVE-2005-0155)

A fix for this issue was first included in the update RHSA-2005:103
released in February 2005.  However the patch to correct this issue was
dropped from the update RHSA-2005:674 made in October 2005.  This
regression has been assigned CVE-2006-3813.

Users of Perl are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b  perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e  perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65  perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837  perl-suidperl-5.8.5-36.RHEL4.i386.rpm

ia64:
cd08f7b4cb850213d2757bfada9dd956  perl-5.8.5-36.RHEL4.ia64.rpm
28edd44703901cc219c0d74938d2b5a7  perl-debuginfo-5.8.5-36.RHEL4.ia64.rpm
35b7ff4152135396feb0b0083831247b  perl-suidperl-5.8.5-36.RHEL4.ia64.rpm

ppc:
a77b3207552f5e625f329b61e09577b5  perl-5.8.5-36.RHEL4.ppc.rpm
9e819e0cdbb412ea396b320ce28270db  perl-debuginfo-5.8.5-36.RHEL4.ppc.rpm
458cf86bb3db0da22ae6378485deffac  perl-suidperl-5.8.5-36.RHEL4.ppc.rpm

s390:
519fc6b7fd84a91a472a670727c55de3  perl-5.8.5-36.RHEL4.s390.rpm
1b993ae54688004ee4dc187bf2fc9e70  perl-debuginfo-5.8.5-36.RHEL4.s390.rpm
b5dc4f4882b412b6260f24ab2b85fdda  perl-suidperl-5.8.5-36.RHEL4.s390.rpm

s390x:
95fefe02a5cea938b95be2b995ae8833  perl-5.8.5-36.RHEL4.s390x.rpm
0fc353a5d0fb16e50504d69fad0b950c  perl-debuginfo-5.8.5-36.RHEL4.s390x.rpm
b146373683877b421333b4edd3e2c1ff  perl-suidperl-5.8.5-36.RHEL4.s390x.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de  perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83  perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7  perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b  perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e  perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65  perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837  perl-suidperl-5.8.5-36.RHEL4.i386.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de  perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83  perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7  perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b  perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e  perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65  perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837  perl-suidperl-5.8.5-36.RHEL4.i386.rpm

ia64:
cd08f7b4cb850213d2757bfada9dd956  perl-5.8.5-36.RHEL4.ia64.rpm
28edd44703901cc219c0d74938d2b5a7  perl-debuginfo-5.8.5-36.RHEL4.ia64.rpm
35b7ff4152135396feb0b0083831247b  perl-suidperl-5.8.5-36.RHEL4.ia64.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de  perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83  perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7  perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-36.RHEL4.src.rpm
1a1cb67f57489eeec48c476419abe21b  perl-5.8.5-36.RHEL4.src.rpm

i386:
4060aca3f76d65d59d7c7d00bd53b70e  perl-5.8.5-36.RHEL4.i386.rpm
c6997488ac05ee1a03ffee1caca35a65  perl-debuginfo-5.8.5-36.RHEL4.i386.rpm
edb22fcfe455c21bfd272c74e9ce6837  perl-suidperl-5.8.5-36.RHEL4.i386.rpm

ia64:
cd08f7b4cb850213d2757bfada9dd956  perl-5.8.5-36.RHEL4.ia64.rpm
28edd44703901cc219c0d74938d2b5a7  perl-debuginfo-5.8.5-36.RHEL4.ia64.rpm
35b7ff4152135396feb0b0083831247b  perl-suidperl-5.8.5-36.RHEL4.ia64.rpm

x86_64:
a2bb0ab0ff5319f5253a84b6d57147de  perl-5.8.5-36.RHEL4.x86_64.rpm
56796ec1f6f34b37dc326368a87f3f83  perl-debuginfo-5.8.5-36.RHEL4.x86_64.rpm
ef416fbb8cce60759907f36625f22bd7  perl-suidperl-5.8.5-36.RHEL4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3813
http://rhn.redhat.com/errata/RHSA-2005-105.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFE26bYXlSAg2UNWIIRAjztAJ4mr/MDyQzZNUCDMzz/cBq4ZOYfpwCeJgwb
rGnPNySNMgwIK8OwM4UV75k=
=Cf9L
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRNwEtyh9+71yA2DNAQJCtAP9H7WsRDocqOFCK8CQMA79zNZPXz5pGWgZ
Z+9eItGV6Pj149lttRbcmJcr+CeYt+M2pAxnC4hrkl4lnL3FfNsVBP3qcv4I8uIr
h9w/RZPBi4V8NkWfdyXvlqXjfiN7GLSb59pCa4Cy8qODc6D3z8p7vxqmnPbfG0gu
Vb2LcYlB6Mk=
=eU/Z
-----END PGP SIGNATURE-----