CVE-2010-1447

NameCVE-2010-1447
DescriptionThe Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2051-1, DSA-2267-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
perl (PTS)jessie5.20.2-3+deb8u9fixed
jessie (security)5.20.2-3+deb8u11fixed
stretch5.24.1-3+deb9u2fixed
stretch (security)5.24.1-3+deb9u4fixed
buster, sid5.26.2-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
perlsource(unstable)5.12.3-1high
perlsourcelenny5.10.0-19lenny5highDSA-2267-1
perlsourcesqueeze5.10.1-17squeeze2highDSA-2267-1
postgresql-8.3source(unstable)(unfixed)high
postgresql-8.3sourcelenny8.3.11-0lenny1highDSA-2051-1
postgresql-8.4source(unstable)8.4.4-1high

Notes

Originally attributed to Postgres, but also affects standard Perl

Search for package or bug name: Reporting problems