Multiple vulnerabilities have been found in the Perl Locale-Maketext module, allowing remote attackers to inject and execute arbitrary Perl code.
Package | perl-core/Locale-Maketext on all architectures |
---|---|
Affected versions | < 1.230.0 |
Unaffected versions | >= 1.230.0 |
Package | dev-lang/perl on all architectures |
---|---|
Affected versions | < 5.17.7 |
Unaffected versions | >= 5.17.7 |
Locale-Maketext - Perl framework for localization
Two vulnerabilities have been reported in the Locale-Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module.
The vulnerabilities are caused due to the “_compile()” function not properly sanitising input, which can be exploited to inject and execute arbitrary Perl code.
A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.
There is no known workaround at this time.
All users of the Locale-Maketext module should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=perl-core/Locale-Maketext-1.230.0"
Release date
October 12, 2014
Latest revision
December 29, 2014: 2
Severity
normal
Exploitable
remote
Bugzilla entries