First published: Mon May 03 2010(Updated: )
Safe.pm 2.26 and earlier (except 2.20 through 2.23 if using a threads-enabled Perl), when used in Perl 5.10.0 and earlier, may allow attackers to break out of safe compartment in (1) Safe::reval or (2) Safe::rdo using subroutine references, whose execution is delayed to happen outside of the safe compartment. If a victim was tricked into running a specially-crafted Perl script, using Safe extension module, it could lead to intended Safe module restrictions bypass, if the returned subroutine reference was called from outside of the compartment. Different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2010-1168">CVE-2010-1168</a>. Solution: Ugrade to Safe.pm v2.27 or higher. References: [1] <a href="http://search.cpan.org/~rgarcia/Safe-2.27/Safe.pm">http://search.cpan.org/~rgarcia/Safe-2.27/Safe.pm</a> Acknowledgements: Red Hat would like to thank Tim Bunce for responsibly reporting this flaw. Upstream credits also Rafaël Garcia-Suarez for discovering of this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
cpan Safe.pm | <2.27 | |
Perl | <=5.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.