[USN-3834-2] Perl vulnerabilities

protocol=”application/pgp-signature”; boundary=”=-RF8ccsM89xITJcVaFXmS”

–=-RF8ccsM89xITJcVaFXmS

Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3834-2
December 03, 2018

perl vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Perl.

Software Description:
– perl: Practical Extraction and Report Language

Details:

USN-3834-1 fixed a vulnerability in perl. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Jayakrishna Menon discovered that Perl incorrectly handled
=C2=A0Perl_my_setenv. An attacker could use this issue to cause Perl to
=C2=A0crash, resulting in a denial of service, or possibly execute arbitrar=
y
=C2=A0code. (CVE-2018-18311)

=C2=A0Eiichi Tsukata discovered that Perl incorrectly handled certain
=C2=A0regular expressions. An attacker could use this issue to cause Perl t=
o
=C2=A0crash, resulting in a denial of service. (CVE-2018-18313)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 perl=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A05.14.2-6ubuntu2.9

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3834-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3834-1
=C2=A0 CVE-2018-18311, CVE-2018-18313
–=-RF8ccsM89xITJcVaFXmS

Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=6O2Q
—–END PGP SIGNATURE—–

–=-RF8ccsM89xITJcVaFXmS–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK