Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "perl-debug": "5.18.2-2ubuntu1.1", "perl": "5.18.2-2ubuntu1.1", "perl-modules": "5.18.2-2ubuntu1.1", "libperl-dev": "5.18.2-2ubuntu1.1", "libperl5.18": "5.18.2-2ubuntu1.1", "libcgi-fast-perl": "5.18.2-2ubuntu1.1", "perl-doc": "5.18.2-2ubuntu1.1", "perl-base": "5.18.2-2ubuntu1.1" } ] }