SB2021081069 - Fedora 33 Modular update for perl-bootstrap
Published: August 10, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Insecure library loading (CVE-ID: CVE-2021-36770)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a logic error in the Encode.pm script. A local user can place a malicious library into the current working directory and escalate privileges on the system.
2) Privilege Escalation (CVE-ID: CVE-2016-1238)
The vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to improper input validation. By sending and tricking the victim to load a specially crafted code a malicious user can cause arbitrary code execution that allows them to gain root privileges.
Successful exploitation of this vulnerability will result in arbitrary code execution that allows a local attacker to get elevated privilegs on the vulnerable system.
3) Insecure search path in perl5-porters (CVE-ID: CVE-2016-1238)
The vulnerability allows a local user to potentially elevate privileges.
The vulnerability exists due to Perl 5 module loads modules from the includes directory array ("@INC") in which the last element is the current directory ("."). A local attacker can place specially crafted modules into world-writable directory and trick the victim to run arbitrary script from this directory.
Successful exploitation of this vulnerability may allow a local attacker to obtain elevated privileges on the system.
Remediation
Install update from vendor's website.