Date: Sat, 2 Sep 2000 15:59:25 -0700 (PDT)
From: Slackware Security Team firstname.lastname@example.org
Subject: [slackware-security] Perl root exploit in Slackware 7.1 & -current
A root exploit was found in the /usr/bin/suidperl5.6.0 program that
shipped with the Slackware 7.1 perl.tgz package.
It is recommended that all users of Slackware 7.1 (and -current) upgrade
to the perl.tgz package available in the Slackware -current branch.
perl 5.6.0 AVAILABLE - (d1/perl.tgz)
The root exploit in /usr/bin/suidperl5.6.0 has been patched. Hack
attempts are now logged to /var/log/syslog. The new perl.tgz
package is available from:
Here are the md5sums and checksums for the packages:
1027099174 6464627 ./perl.tgz
INSTALLATION INSTRUCTIONS FOR THE perl.tgz PACKAGE:
If you have downloaded the new perl.tgz package, you should bring
the system into runlevel 1 and run upgradepkg on it:
# telinit 1
# upgradepkg perl.tgz
# telinit 3
Remember, it's also a good idea to backup configuration files before
- Slackware Linux Security Team
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.