• [gentoo-announce] [ GLSA 202411-09 ] Perl: Multiple Vulnerabilities

    From glsamaker@gentoo.org@21:1/5 to All on Sun Nov 17 11:00:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202411-09
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Perl: Multiple Vulnerabilities
    Date: November 17, 2024
    Bugs: #807307, #905296, #918612
    ID: 202411-09

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in Perl, the worst of
    which can lead to arbitrary code execution.

    Background
    ==========

    Perl is Larry Wall’s Practical Extraction and Report Language.

    Affected packages
    =================

    Package Vulnerable Unaffected
    ------------- ------------ ------------
    dev-lang/perl < 5.38.2 >= 5.38.2

    Description
    ===========

    Multiple vulnerabilities have been discovered in Perl. Please review the
    CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Perl users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.38.2"

    References
    ==========

    [ 1 ] CVE-2021-36770
    https://nvd.nist.gov/vuln/detail/CVE-2021-36770
    [ 2 ] CVE-2023-31486
    https://nvd.nist.gov/vuln/detail/CVE-2023-31486
    [ 3 ] CVE-2023-47038
    https://nvd.nist.gov/vuln/detail/CVE-2023-47038

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202411-09

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmc5vJwACgkQFMQkOaVy +9mj9RAAhgaTHHvsop1fqyfayal6K3tx/lB2AFL1nv8GlEPTof82Zhi4UeYeLZla ivZZzM/4Ttw6oED+kIx+e0Il6UBHFqod1V5VqDa3kPJQk/UBLnrPhxDdHOdZWVwr mhTr0QEkEjODQurhJo+6dgUGjlU8OtRfYWdLjgyMEs9jE0vG7Of5YdjiNq4lrDLq iVxPIUoubn4qHvPndwjzRXDtmU0RD9rwT+u1L20PA08su34xehdTHDd9Nth8iX9n MBtiXtpfzN2HuQDVdKnvgwfQwNG6wvzwg8qJN0NHzUnjajDxgZIUN48pV4V9KjcA 495fXEHWLJva35hRYDILvnw1+AGCgIwNUyUiE/Cs9WBZrYaymg8r/SdvynwVM6ep tuxaLtzLG+ITeJib76jykCbALJ6ADWXftxvybLrywK9i2mEzvQYs4BOMVhpX+R33 e+RUAAYw+KDBAmeDflRD+DNLcc6n39WfsSn5C4zK4oRreOi0O5IoBJ4DGuiJE3gj QIlOxoksU8pkaa4nGCj+zB5OeOnp3t4NmME9Wc7veXWontqwtaJCh8LUBO3x2mKQ opdDxkABQJ4HrVMGoulwvfBtznLrpkv+8rFvH8IvNXLsgTC6nA0xI6ibd1t1qZ7j qca7eMUaC7HgelVArOamBakCV6Oj0CRapNN1KI42/CNIbiy7FDg=
    =JDC5
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)