Bug 588269 (CVE-2010-1447)
Summary: | CVE-2010-1447 perl: Safe restriction bypass when reference to subroutine in compartment is called from outside | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | hhorak, mjc, mmaslano, ohudlick, security-response-team, vdanen |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-19 09:11:55 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 591159, 591160, 591161, 591167, 591168, 598397, 598398 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2010-05-03 11:05:22 UTC
This is CVE-2010-1447. This issue is public now, but MITRE has given it a strange description that may be confusing to people as it refers to PostgreSQL more than Perl: Common Vulnerabilities and Exposures assigned an identifier CVE-2010-1447 to the following vulnerability: Name: CVE-2010-1447 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1447 Assigned: 20100415 Reference: CONFIRM: http://security-tracker.debian.org/tracker/CVE-2010-1447 Reference: CONFIRM: http://www.postgresql.org/about/news.1203 Reference: CONFIRM: https://bugs.launchpad.net/bugs/cve/2010-1447 Reference: CONFIRM: https://bugzilla.redhat.com/show_bug.cgi?id=588269 Reference: SECUNIA:39845 Reference: URL: http://secunia.com/advisories/39845 Reference: VUPEN:ADV-2010-1167 Reference: URL: http://www.vupen.com/english/advisories/2010/1167 PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which might allow remote attackers to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. It's probably PostgreSQL announcement that's causing the confusion, as it mentions perl CVE-2010-1447 too, and there was no public reference for CVE-2010-1447 at that time. Quick disambiguation summary - CVE-2010-1447 (for perl/Safe) and CVE-2010-1169 (for PostgreSQL) are closely related and describe basically the same issue. Safe fix makes sure that subroutines called form outside of the compartment is still restricted by Safe. This approach did not work for PostgreSQL, which instead abandoned Safe and relies on Opcode now instead. (In reply to comment #8) > This issue is public now, but MITRE has given it a strange description that may > be confusing to people as it refers to PostgreSQL more than Perl: > Detailed post trying to solve the current confusion: [1] http://www.openwall.com/lists/oss-security/2010/05/20/5 This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Via RHSA-2010:0457 https://rhn.redhat.com/errata/RHSA-2010-0457.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0458 https://rhn.redhat.com/errata/RHSA-2010-0458.html perl-5.10.1-116.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report. |