Summary: | <perl-core/digest-base-1.170.0 "Digest->new()" Code Injection Vulnerability (CVE-2011-3597) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | perl |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/46279/ | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 458122 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() @perl, can we proceed with stabilization of perl-core/digest-base-1.170.0? Thanks. CVE-2011-3597 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3597): Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor. It's already stabilized in bug 458122 Thanks New GLSA request filed This issue was resolved and addressed in GLSA 201401-33 at http://security.gentoo.org/glsa/glsa-201401-33.xml by GLSA coordinator Mikle Kolyada (Zlogene). |