Bug 32592 - perl new security issue CVE-2023-47038
Summary: perl new security issue CVE-2023-47038
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: MGA9-64-OK MGA9-32-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2023-12-04 11:05 CET by Nicolas Salguero
Modified: 2024-02-04 03:51 CET (History)
5 users (show)

See Also:
Source RPM: perl-5.36.0-1.mga9.src.rpm
CVE: CVE-2023-47038
Status comment:


Attachments

Description Nicolas Salguero 2023-12-04 11:05:06 CET
CVE-2023-47038 was announced here:
https://www.openwall.com/lists/oss-security/2023/12/01/1

Mageia 9 is also affected.
Nicolas Salguero 2023-12-04 11:06:00 CET

Source RPM: (none) => perl-5.38.0-2.mga10.src.rpm
Whiteboard: (none) => MGA9TOO
Status comment: (none) => Fixed upstream in 5.38.2 and 5.36.3

Comment 1 Lewis Smith 2023-12-04 16:19:33 CET
Assigning to Perl group.

Assignee: bugsquad => perl

Comment 2 Nicolas Salguero 2024-01-30 11:58:27 CET
Suggested advisory:
========================

The updated packages fix a security vulnerability:

Write past buffer end via illegal user-defined Unicode property. (CVE-2023-47038)

References:
https://www.openwall.com/lists/oss-security/2023/12/01/1
========================

Updated packages in core/updates_testing:
========================
perl-5.36.0-1.1.mga9
perl-base-5.36.0-1.1.mga9
perl-devel-5.36.0-1.1.mga9
perl-doc-5.36.0-1.1.mga9

from SRPM:
perl-5.36.0-1.1.mga9.src.rpm

Source RPM: perl-5.38.0-2.mga10.src.rpm => perl-5.36.0-1.mga9.src.rpm
Version: Cauldron => 9
Status: NEW => ASSIGNED
Assignee: perl => qa-bugs
CVE: (none) => CVE-2023-47038
Status comment: Fixed upstream in 5.38.2 and 5.36.3 => (none)
Whiteboard: MGA9TOO => (none)

Comment 3 Len Lawrence 2024-01-30 20:32:58 CET
Mageia9 x86_64
The comments accessed via the CVE link talk about a write buffer overflow vulnerability affecting Windows systems so it is probably out of our jurisdiction.

Clean update.
$ locate .pl | wc -l
4569
$ clock.pl
launched the Date, Clock and Time Zone Settings gui.
Checked 'Enable Network Time Protocol' and was asked to install chrony.
Chose Europe All Servers pool.

Found an old PoC which creates an aiff file.
Ran it to see what happens:
$ perl nemux.pl

[*] Making AIFF file: "nemux.aiff"
[*] Done... AIFF File Size: 21672

Is it over? ... Hello? ... Did we win? (cit.)

[+] You can test it on OSX and Linux with Audacity  - linux command line /usr/bin/audacity namux.aiff
[+] You can test it on OSX Windows and Linux        - with Adobe Audition
Note: Adobe Audition will trigger the bug just when it scans the directory that contains this aiff file

Marco Romano @nemux_

$ ll *.aiff
-rw-r--r-- 1 lcl lcl 21672 Jan 30 17:59 nemux.aiff

audacity did not recognise the type of the file but it could be imported as raw data and showed audio file characteristics.

MCC/drakconf has a lot of perl dependencies so ran that to exercise perl.

Installed perl-ImageMagick and ran a local example.pl file which applied a set of transformations of a test image and generated a 5x15 mosaic image of all of them.

Everything seems to work.

CC: (none) => tarazed25
Whiteboard: (none) => MGA9-64-OK

Marja Van Waes 2024-01-30 21:16:59 CET

CC: (none) => marja11
URL: (none) => https://www.openwall.com/lists/oss-security/2023/12/01/1

Marja Van Waes 2024-01-30 21:18:50 CET

Keywords: (none) => advisory

katnatek 2024-01-31 03:06:23 CET

CC: (none) => andrewsfarm

Comment 4 katnatek 2024-01-31 03:27:51 CET
Updated without issues
urpmi family still works
MCC works
Comment 5 Morgan Leijström 2024-01-31 09:53:27 CET
mga9-64 OK here

Updated perl and ran some MCC parts: nothing but the usual noise in the terminal from were i launched it.


@katnaktek: what arch did you test?

This being important system package (i e for out tools), I think we need 32 bit tests too?

CC: (none) => fri

Comment 6 katnatek 2024-01-31 18:21:53 CET
(In reply to Morgan Leijström from comment #5)
> @katnaktek: what arch did you test?
> 
> This being important system package (i e for out tools), I think we need 32
> bit tests too?

Tested in real hardware mageia 9 x86_64
I will test later in i586
Comment 7 katnatek 2024-01-31 22:14:52 CET
Tested in Real Hardware Mageia 9 i586 lxqt

I update this packages before test the packages for kernel 6.6
MCC and urpmi family works as always
katnatek 2024-02-03 00:45:54 CET

Whiteboard: MGA9-64-OK => MGA9-64-OK MGA9-32-OK

Comment 8 Thomas Andrews 2024-02-03 04:40:22 CET
Thanks for the tests. Validating.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2024-02-04 03:51:26 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0021.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.