A vulnerability has been found in the Digest-Base Perl module, allowing remote attackers to execute arbitrary code.
Package | perl-core/digest-base on all architectures |
---|---|
Affected versions | < 1.170.0 |
Unaffected versions | >= 1.170.0 |
Digest-Base is a set of Perl modules that calculate message digests
The vulnerability is caused due to the “Digest->new()” function not properly sanitising input before using it in an “eval()” call.
The vulnerability might allow an attacker to execute arbitrary code.
There is no known workaround at this time.
All Digest-Base module users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=perl-core/digest-base-1.170.0"
Release date
January 29, 2014
Latest revision
January 29, 2014: 1
Severity
high
Exploitable
remote
Bugzilla entries