- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Low: perl-DBI security update
Advisory ID:       RHSA-2005:072-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2005:072.html
Issue date:        2005-02-15
Updated on:        2005-02-15
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0077
- ---------------------------------------------------------------------1. Summary:

An updated perl-DBI package that fixes a temporary file flaw in
DBI::ProxyServer is now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

DBI is a database access Application Programming Interface (API) for
the Perl programming language. 

The Debian Security Audit Project discovered that the DBI library creates a
temporary PID file in an insecure manner.  A local user could overwrite or
create files as a different user who happens to run an application which
uses DBI::ProxyServer.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0077 to this issue. 

Users should update to this erratum package which disables the temporary
PID file unless configured.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

145577 - CAN-2005-0077 perl-DBI insecure temporary file usage

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a  perl-DBI-1.40-8.ia64.rpm

ppc:
a9a28fb845faf483e66253830c095cc9  perl-DBI-1.40-8.ppc.rpm

s390:
1574b5f38084c6a0bde8a7c8c83ccb0c  perl-DBI-1.40-8.s390.rpm

s390x:
04b4f82b9627867ce69f796512fa0fb8  perl-DBI-1.40-8.s390x.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a  perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
3f5f00c7f9484f6d1aa1eb2b5b0d2614  perl-DBI-1.40-8.src.rpm

i386:
0407a8b42dc926caaa4cdbae2400b8be  perl-DBI-1.40-8.i386.rpm

ia64:
2f1629ca7602562481639da97f5e009a  perl-DBI-1.40-8.ia64.rpm

x86_64:
81976ba94390dd25e69409de4cf4fcf0  perl-DBI-1.40-8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

RedHat: Low: perl-DBI security update

An updated perl-DBI package that fixes a temporary file flaw in DBI::ProxyServer is now available for Red Hat Enterprise Linux 4. This update has been rated as having low securit...

Summary



Summary

DBI is a database access Application Programming Interface (API) for the Perl programming language. The Debian Security Audit Project discovered that the DBI library creates a temporary PID file in an insecure manner. A local user could overwrite or create files as a different user who happens to run an application which uses DBI::ProxyServer. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0077 to this issue. Users should update to this erratum package which disables the temporary PID file unless configured.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
145577 - CAN-2005-0077 perl-DBI insecure temporary file usage
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: 3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm
i386: 0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm
ia64: 2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm
ppc: a9a28fb845faf483e66253830c095cc9 perl-DBI-1.40-8.ppc.rpm
s390: 1574b5f38084c6a0bde8a7c8c83ccb0c perl-DBI-1.40-8.s390.rpm
s390x: 04b4f82b9627867ce69f796512fa0fb8 perl-DBI-1.40-8.s390x.rpm
x86_64: 81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: 3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm
i386: 0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm
x86_64: 81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: 3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm
i386: 0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm
ia64: 2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm
x86_64: 81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: 3f5f00c7f9484f6d1aa1eb2b5b0d2614 perl-DBI-1.40-8.src.rpm
i386: 0407a8b42dc926caaa4cdbae2400b8be perl-DBI-1.40-8.i386.rpm
ia64: 2f1629ca7602562481639da97f5e009a perl-DBI-1.40-8.ia64.rpm
x86_64: 81976ba94390dd25e69409de4cf4fcf0 perl-DBI-1.40-8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077

Package List


Severity
Advisory ID: RHSA-2005:072-01
Advisory URL: https://access.redhat.com/errata/RHSA-2005:072.html
Issued Date: : 2005-02-15
Updated on: 2005-02-15
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0077 An updated perl-DBI package that fixes a temporary file flaw in DBI::ProxyServer is now available for Red Hat Enterprise Linux 4. This update has been rated as having low security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News