Mailinglist Archive: opensuse-updates (111 mails)

< Previous Next >
openSUSE-SU-2016:2313-1: moderate: Security update for perl
openSUSE Security Update: Security update for perl
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:2313-1
Rating: moderate
References: #928292 #932894 #967082 #984906 #987887 #988311

Cross-References: CVE-2015-8853 CVE-2016-1238 CVE-2016-2381
CVE-2016-6185
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that solves four vulnerabilities and has two
fixes is now available.

Description:


This update for Perl fixes the following issues:

- CVE-2016-6185: Xsloader looking at a "(eval)" directory. (bsc#988311)
- CVE-2016-1238: Searching current directory for optional modules.
(bsc#987887)
- CVE-2015-8853: Regular expression engine hanging on bad utf8. (bsc)
- CVE-2016-2381: Environment dup handling bug. (bsc#967082)
- "Insecure dependency in require" error in taint mode. (bsc#984906)
- Memory leak in 'use utf8' handling. (bsc#928292)
- Missing lock prototype to the debugger. (bsc#932894)

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-1086=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.1 (i586 x86_64):

perl-5.18.2-5.1
perl-base-5.18.2-5.1
perl-base-debuginfo-5.18.2-5.1
perl-debuginfo-5.18.2-5.1
perl-debugsource-5.18.2-5.1

- openSUSE Leap 42.1 (x86_64):

perl-32bit-5.18.2-5.1
perl-base-32bit-5.18.2-5.1
perl-base-debuginfo-32bit-5.18.2-5.1
perl-debuginfo-32bit-5.18.2-5.1

- openSUSE Leap 42.1 (noarch):

perl-doc-5.18.2-5.1


References:

https://www.suse.com/security/cve/CVE-2015-8853.html
https://www.suse.com/security/cve/CVE-2016-1238.html
https://www.suse.com/security/cve/CVE-2016-2381.html
https://www.suse.com/security/cve/CVE-2016-6185.html
https://bugzilla.suse.com/928292
https://bugzilla.suse.com/932894
https://bugzilla.suse.com/967082
https://bugzilla.suse.com/984906
https://bugzilla.suse.com/987887
https://bugzilla.suse.com/988311


< Previous Next >
This Thread
  • No further messages