Multiple vulnerabilities have been found in the Perl Locale-Maketext module, allowing remote attackers to inject and execute arbitrary Perl code.
|Package||perl-core/Locale-Maketext on all architectures|
|Affected versions||< 1.230.0|
|Unaffected versions||>= 1.230.0|
|Package||dev-lang/perl on all architectures|
|Affected versions||< 5.17.7|
|Unaffected versions||>= 5.17.7|
Locale-Maketext - Perl framework for localization
Two vulnerabilities have been reported in the Locale-Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module.
The vulnerabilities are caused due to the “_compile()” function not properly sanitising input, which can be exploited to inject and execute arbitrary Perl code.
A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.
There is no known workaround at this time.
All users of the Locale-Maketext module should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=perl-core/Locale-Maketext-1.230.0"
October 12, 2014
December 29, 2014: 2