openSUSE Security Update: Security update for perl ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2313-1 Rating: moderate References: #928292 #932894 #967082 #984906 #987887 #988311 Cross-References: CVE-2015-8853 CVE-2016-1238 CVE-2016-2381 CVE-2016-6185 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves four vulnerabilities and has two fixes is now available. Description: This update for Perl fixes the following issues: - CVE-2016-6185: Xsloader looking at a "(eval)" directory. (bsc#988311) - CVE-2016-1238: Searching current directory for optional modules. (bsc#987887) - CVE-2015-8853: Regular expression engine hanging on bad utf8. (bsc) - CVE-2016-2381: Environment dup handling bug. (bsc#967082) - "Insecure dependency in require" error in taint mode. (bsc#984906) - Memory leak in 'use utf8' handling. (bsc#928292) - Missing lock prototype to the debugger. (bsc#932894) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1086=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): perl-5.18.2-5.1 perl-base-5.18.2-5.1 perl-base-debuginfo-5.18.2-5.1 perl-debuginfo-5.18.2-5.1 perl-debugsource-5.18.2-5.1 - openSUSE Leap 42.1 (x86_64): perl-32bit-5.18.2-5.1 perl-base-32bit-5.18.2-5.1 perl-base-debuginfo-32bit-5.18.2-5.1 perl-debuginfo-32bit-5.18.2-5.1 - openSUSE Leap 42.1 (noarch): perl-doc-5.18.2-5.1 References: https://www.suse.com/security/cve/CVE-2015-8853.html https://www.suse.com/security/cve/CVE-2016-1238.html https://www.suse.com/security/cve/CVE-2016-2381.html https://www.suse.com/security/cve/CVE-2016-6185.html https://bugzilla.suse.com/928292 https://bugzilla.suse.com/932894 https://bugzilla.suse.com/967082 https://bugzilla.suse.com/984906 https://bugzilla.suse.com/987887 https://bugzilla.suse.com/988311