openSUSE Security Update: update for perl ______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:0502-1 Rating: important References: #789994 #797060 #804415 Cross-References: CVE-2012-5526 CVE-2012-6329 CVE-2013-1667
Affected Products: openSUSE 11.4 ______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
Perl was updated to fix 3 security issues:
- fix rehash denial of service (compute time) [bnc#804415] [CVE-2013-1667] - improve CGI crlf escaping [bnc#789994] [CVE-2012-5526] - sanitize input in Maketext.pm to avoid code injection [bnc#797060] [CVE-2012-6329]
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch 2013-46
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
perl-5.12.3-11.36.1 perl-base-5.12.3-11.36.1 perl-base-debuginfo-5.12.3-11.36.1 perl-debuginfo-5.12.3-11.36.1 perl-debugsource-5.12.3-11.36.1
- openSUSE 11.4 (x86_64):
perl-32bit-5.12.3-11.36.1 perl-base-32bit-5.12.3-11.36.1 perl-base-debuginfo-32bit-5.12.3-11.36.1 perl-debuginfo-32bit-5.12.3-11.36.1
- openSUSE 11.4 (noarch):
perl-doc-5.12.3-11.36.1
- openSUSE 11.4 (ia64):
perl-base-debuginfo-x86-5.12.3-11.36.1 perl-base-x86-5.12.3-11.36.1 perl-debuginfo-x86-5.12.3-11.36.1 perl-x86-5.12.3-11.36.1
References:
http://support.novell.com/security/cve/CVE-2012-5526.html http://support.novell.com/security/cve/CVE-2012-6329.html http://support.novell.com/security/cve/CVE-2013-1667.html https://bugzilla.novell.com/789994 https://bugzilla.novell.com/797060 https://bugzilla.novell.com/804415