[USN-3834-1] Perl vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”mLVBU7Y8niNwC7c2p1sRoCB0DyFKvAFgW”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–mLVBU7Y8niNwC7c2p1sRoCB0DyFKvAFgW

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3834-1] Perl vulnerabilities

–DgpcnIJsT4gemk3Down6SVw53iyAdIBrV

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3834-1
December 03, 2018

perl vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Perl.

Software Description:
– perl: Practical Extraction and Report Language

Details:

Jayakrishna Menon discovered that Perl incorrectly handled Perl_my_setenv=
=2E
An attacker could use this issue to cause Perl to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2018-18311)

Eiichi Tsukata discovered that Perl incorrectly handled certain regular
expressions. An attacker could use this issue to cause Perl to crash,
resulting in a denial of service, or possibly execute arbitrary code. Thi=
s
issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 18.10.=

(CVE-2018-18312)

Eiichi Tsukata discovered that Perl incorrectly handled certain regular
expressions. An attacker could use this issue to cause Perl to crash,
resulting in a denial of service. (CVE-2018-18313)

Jakub Wilk discovered that Perl incorrectly handled certain regular
expressions. An attacker could use this issue to cause Perl to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, and Ubuntu 18.10. (CVE-2018-18314)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
perl 5.26.2-7ubuntu0.1

Ubuntu 18.04 LTS:
perl 5.26.1-6ubuntu0.3

Ubuntu 16.04 LTS:
perl 5.22.1-9ubuntu0.6

Ubuntu 14.04 LTS:
perl 5.18.2-2ubuntu1.7

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3834-1
CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314

Package Information:
https://launchpad.net/ubuntu/+source/perl/5.26.2-7ubuntu0.1
https://launchpad.net/ubuntu/+source/perl/5.26.1-6ubuntu0.3
https://launchpad.net/ubuntu/+source/perl/5.22.1-9ubuntu0.6
https://launchpad.net/ubuntu/+source/perl/5.18.2-2ubuntu1.7

–DgpcnIJsT4gemk3Down6SVw53iyAdIBrV–

–mLVBU7Y8niNwC7c2p1sRoCB0DyFKvAFgW

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=JC3G
—–END PGP SIGNATURE—–

–mLVBU7Y8niNwC7c2p1sRoCB0DyFKvAFgW–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK