Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31412
HistoryDec 01, 2014 - 12:00 a.m.

[ MDVSA-2014:235 ] perl-Plack

2014-12-0100:00:00
vulners.com
17

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2014:235
http://www.mandriva.com/en/support/security/


Package : perl-Plack
Date : November 28, 2014
Affected: Business Server 1.0


Problem Description:

Updated perl-Plack package fixes security vulnerability:

Plack::App::File would previously strip trailing slashes off provided
paths. This in combination with the common pattern of serving files
with Plack::Middleware::Static could allow an attacker to bypass a
whitelist of generated files (CVE-2014-5269).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5269
http://advisories.mageia.org/MGASA-2014-0486.html


Updated Packages:

Mandriva Business Server 1/X86_64:
700ac439f71aba66f7afb93a2a842f41 mbs1/x86_64/perl-Plack-0.998.500-3.1.mbs1.noarch.rpm
9f691a99f2eb722c33cdb0f8382a25ec mbs1/SRPMS/perl-Plack-0.998.500-3.1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFUeETumqjQ0CJFipgRAkarAKDRvSl3tLV9UL+afH5h1EBq5JWq3gCggK63
5uL2W1GvfPzT47xjUZ739zs=
=yiOO
-----END PGP SIGNATURE-----