MGASA-2018-0428 - Updated perl-Dancer2 packages fix security vulnerabilities

Publication date: 03 Nov 2018
URL: https://advisories.mageia.org/MGASA-2018-0428.html
Type: security
Affected Mageia releases: 6

Dancer2 0.206000 addresses several potential security issues. There is a
potential RCE with regards to Storable. Dancer2 adds session ID validation to
the session engine so that session backends based on Storable can reject
malformed session IDs that may lead to exploitation of the RCE. Parsing
requests now uses HTTP::Entity::Parser which reduces the amount of code needed
and does not require re-parsing the request body.

The perl-Dancer2 package has been updated to version 0.206.0 to fix this issue.

Also, the perl-HTTP-XSCookies, perl-WWW-Form-UrlEncoded,
perl-HTTP-MultiPartParser, and perl-HTTP-Entity-Parser dependencies have been
added and the perl-Type-Tiny, perl-HTTP-Headers-Fast, perl-JSON-MaybeXS,
perl-Cookie-Baker, and perl-Plack dependencies have been updated for the new
perl-Dancer2 version.

References:
- https://bugs.mageia.org/show_bug.cgi?id=23127
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IQXVVVJM54QO6NGMMJJH56545OVCFQA4/

SRPMS:
- 6/core/perl-Dancer2-0.206.0-1.1.mga6
- 6/core/perl-Cookie-Baker-0.100.0-1.2.mga6
- 6/core/perl-HTTP-Entity-Parser-0.210.0-1.mga6
- 6/core/perl-HTTP-Headers-Fast-0.210.0-1.1.mga6
- 6/core/perl-HTTP-MultiPartParser-0.20.0-1.mga6
- 6/core/perl-HTTP-XSCookies-0.0.21-1.1.mga6
- 6/core/perl-JSON-MaybeXS-1.4.0-1.mga6
- 6/core/perl-Plack-1.4.700-1.1.mga6
- 6/core/perl-Type-Tiny-1.4.2-1.1.mga6
- 6/core/perl-WWW-Form-UrlEncoded-0.250.0-1.mga6

Mageia 2018-0428: perl-Dancer2 security update

Dancer2 0.206000 addresses several potential security issues

Summary

Dancer2 0.206000 addresses several potential security issues. There is a potential RCE with regards to Storable. Dancer2 adds session ID validation to the session engine so that session backends based on Storable can reject malformed session IDs that may lead to exploitation of the RCE. Parsing requests now uses HTTP::Entity::Parser which reduces the amount of code needed

References

- https://bugs.mageia.org/show_bug.cgi?id=23127

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/IQXVVVJM54QO6NGMMJJH56545OVCFQA4/

Resolution

MGASA-2018-0428 - Updated perl-Dancer2 packages fix security vulnerabilities

SRPMS

- 6/core/perl-Dancer2-0.206.0-1.1.mga6

- 6/core/perl-Cookie-Baker-0.100.0-1.2.mga6

- 6/core/perl-HTTP-Entity-Parser-0.210.0-1.mga6

- 6/core/perl-HTTP-Headers-Fast-0.210.0-1.1.mga6

- 6/core/perl-HTTP-MultiPartParser-0.20.0-1.mga6

- 6/core/perl-HTTP-XSCookies-0.0.21-1.1.mga6

- 6/core/perl-JSON-MaybeXS-1.4.0-1.mga6

- 6/core/perl-Plack-1.4.700-1.1.mga6

- 6/core/perl-Type-Tiny-1.4.2-1.1.mga6

- 6/core/perl-WWW-Form-UrlEncoded-0.250.0-1.mga6

Severity
Publication date: 03 Nov 2018
URL: https://advisories.mageia.org/MGASA-2018-0428.html
Type: security

Related News