drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in perl
Name: |
Mehrere Probleme in perl |
|
ID: |
FEDORA-2018-ca03363d57 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 28 |
|
Datum: |
Mi, 12. Dezember 2018, 07:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313 |
|
Applikationen: |
Perl |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2018-ca03363d57 2018-12-12 01:44:17.844989 ------------------------------------------------------------------------------- -
Name : perl Product : Fedora 28 Version : 5.26.3 Release : 415.fc28 URL : http://www.perl.org/ Summary : Practical Extraction and Report Language Description : Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming.
This is a metapackage with all the Perl bits and core modules that can be found in the upstream tarball from perl.org.
If you need only a specific feature, you can install a specific package instead. E.g. to handle Perl scripts with /usr/bin/perl interpreter, install perl-interpreter package. See perl-interpreter description for more details on the Perl decomposition into packages.
------------------------------------------------------------------------------- - Update Information:
Security fix for CVE-2018-18311, CVE-2018-18312, CVE-2018-18313 and CVE-2018-18314 ------------------------------------------------------------------------------- - ChangeLog:
* Fri Nov 30 2018 Jitka Plesnikova <jplesnik@redhat.com> - 4:5.26.3-415 - 5.26.3 bump * Thu Oct 25 2018 Jitka Plesnikova <jplesnik@redhat.com> - 4:5.26.2-414 - Fix annocheck failure by passing CFLAGS to dtrace * Mon Jul 9 2018 Petr Pisar <ppisar@redhat.com> - 4:5.26.2-413 - Adjust tests to gdbm-1.15 (RT#133295) - Fix an integer wrap when allocating memory for an environment variable (RT#133204) - Fix printing a warning about a wide character when matching a regular expression while ISO-8859-1 locale is in effect - Fix invoking a check for wide characters while ISO-8859-1 locale is in effect * Fri May 25 2018 Petr Pisar <ppisar@redhat.com> - 4:5.26.2-412 - perl-devel requires redhat-rpm-config because of hardened compiler profiles (bug #1557667) - Do not clobber file bytes in :encoding layer (RT#132833) - Fix line numbers in multi-line s/// (RT#131930) - Fix parsing extended bracketed character classes (RT#132167) - Fix a possibly unitialized memory read in the Perl parser (RT#133074) - Fix an infinite loop in the regular expression compiler (RT#133185) * Fri May 18 2018 Jitka Plesnikova <jplesnik@redhat.com> - 4:5.26.2-411 - Correct license tags of perl-libs (bug #1579524) * Mon Apr 16 2018 Petr Pisar <ppisar@redhat.com> - 4:5.26.2-410 - 5.26.2 bump - Fix CVE-2018-6913 (heap buffer overflow in pp_pack.c) (bug #1567776) - Fix CVE-2018-6798 (heap read overflow in regexec.c) (bug #1567777) - Fix CVE-2018-6797 (heap write overflow in regcomp.c) (bug #1567778) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1646751 - CVE-2018-18314 perl: Heap-based buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=1646751 [ 2 ] Bug #1646738 - CVE-2018-18313 perl: Heap-buffer-overflow read in regcomp.c https://bugzilla.redhat.com/show_bug.cgi?id=1646738 [ 3 ] Bug #1646730 - CVE-2018-18311 perl: Integer overflow leading to buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=1646730 [ 4 ] Bug #1646734 - CVE-2018-18312 perl: Heap-buffer-overflow write / reg_node overrun https://bugzilla.redhat.com/show_bug.cgi?id=1646734 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2018-ca03363d57' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
|
|
|
|