USN-3625-2: Perl vulnerabilities
17 April 2018
Several security issues were fixed in Perl.
Releases
Packages
- perl - Practical Extraction and Report Language
Details
USN-3625-1 fixed a vulnerability in Perl. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that Perl incorrectly handled certain regular
expressions. An attacker could possibly use this issue to cause Perl to
hang, resulting in a denial of service. (CVE-2015-8853)
It was discovered that Perl incorrectly loaded libraries from the current
working directory. A local attacker could possibly use this issue to
execute arbitrary code. (CVE-2016-6185)
It was discovered that Perl incorrectly handled the rmtree and remove_tree
functions. A local attacker could possibly use this issue to set the mode
on arbitrary files. (CVE-2017-6512)
GwanYeong Kim discovered that Perl incorrectly handled certain data when
using the pack function. An attacker could use this issue to cause Perl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2018-6913)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3625-1: libperl-dev, perl-base, libcgi-fast-perl, perl-doc, libperl5.18, perl-debug, perl-modules, perl-modules-5.22, perl, libperl5.22