Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in perl
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in perl
ID: openSUSE-SU-2013:0497-1
Distribution: SUSE
Plattformen: openSUSE 12.1, openSUSE 12.2, openSUSE 12.3
Datum: Mi, 20. März 2013, 11:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
Applikationen: Perl

Originalnachricht

   openSUSE Security Update: update for perl
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:0497-1
Rating: important
References: #755278 #789994 #797060 #804415
Cross-References: CVE-2012-5526 CVE-2012-6329 CVE-2013-1667

Affected Products:
openSUSE 12.3
openSUSE 12.2
openSUSE 12.1
______________________________________________________________________________

An update that solves three vulnerabilities and has one
errata is now available.

Description:

Perl was updated to fix 3 security issues:

- fix rehash denial of service (compute time) [bnc#804415]
[CVE-2013-1667]
- improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
- sanitize input in Maketext.pm to avoid code injection
[bnc#797060] [CVE-2012-6329]

In openSUSE 12.1 also the following non-security bug was
fixed:
- fix IPC::Open3 bug when '-' is used [bnc#755278]


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-225

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-225

- openSUSE 12.1:

zypper in -t patch openSUSE-2013-225

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

perl-5.16.2-2.5.1
perl-base-5.16.2-2.5.1
perl-base-debuginfo-5.16.2-2.5.1
perl-debuginfo-5.16.2-2.5.1
perl-debugsource-5.16.2-2.5.1

- openSUSE 12.3 (x86_64):

perl-32bit-5.16.2-2.5.1
perl-base-32bit-5.16.2-2.5.1
perl-base-debuginfo-32bit-5.16.2-2.5.1
perl-debuginfo-32bit-5.16.2-2.5.1

- openSUSE 12.3 (noarch):

perl-doc-5.16.2-2.5.1

- openSUSE 12.2 (i586 x86_64):

perl-5.16.0-3.5.1
perl-base-5.16.0-3.5.1
perl-base-debuginfo-5.16.0-3.5.1
perl-debuginfo-5.16.0-3.5.1
perl-debugsource-5.16.0-3.5.1

- openSUSE 12.2 (x86_64):

perl-32bit-5.16.0-3.5.1
perl-base-32bit-5.16.0-3.5.1
perl-base-debuginfo-32bit-5.16.0-3.5.1
perl-debuginfo-32bit-5.16.0-3.5.1

- openSUSE 12.2 (noarch):

perl-doc-5.16.0-3.5.1

- openSUSE 12.1 (i586 x86_64):

perl-5.14.2-9.1
perl-base-5.14.2-9.1
perl-base-debuginfo-5.14.2-9.1
perl-debuginfo-5.14.2-9.1
perl-debugsource-5.14.2-9.1

- openSUSE 12.1 (x86_64):

perl-32bit-5.14.2-9.1
perl-base-32bit-5.14.2-9.1
perl-base-debuginfo-32bit-5.14.2-9.1
perl-debuginfo-32bit-5.14.2-9.1

- openSUSE 12.1 (noarch):

perl-doc-5.14.2-9.1

- openSUSE 12.1 (ia64):

perl-base-debuginfo-x86-5.14.2-9.1
perl-base-x86-5.14.2-9.1
perl-debuginfo-x86-5.14.2-9.1
perl-x86-5.14.2-9.1


References:

http://support.novell.com/security/cve/CVE-2012-5526.html
http://support.novell.com/security/cve/CVE-2012-6329.html
http://support.novell.com/security/cve/CVE-2013-1667.html
https://bugzilla.novell.com/755278
https://bugzilla.novell.com/789994
https://bugzilla.novell.com/797060
https://bugzilla.novell.com/804415

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung