USN-2916-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-2916-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2916-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2916-1
Related
Published
2016-03-02T13:37:19.802600Z
Modified
2016-03-02T13:37:19.802600Z
Summary
perl vulnerabilities
Details

It was discovered that Perl incorrectly handled certain regular expressions with an invalid backreference. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2013-7422)

Markus Vervier discovered that Perl incorrectly handled nesting in the Data::Dumper module. An attacker could use this issue to cause Perl to consume memory and crash, resulting in a denial of service. (CVE-2014-4330)

Stephane Chazelas discovered that Perl incorrectly handled duplicate environment variables. An attacker could possibly use this issue to bypass the taint protection mechanism. (CVE-2016-2381)

References

Affected packages

Ubuntu:14.04:LTS / perl

Package

Name
perl
Purl
pkg:deb/ubuntu/perl@5.18.2-2ubuntu1.1?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.18.2-2ubuntu1.1

Affected versions

5.*

5.14.2-21build1
5.18.1-4
5.18.1-4build1
5.18.1-5
5.18.2-2
5.18.2-2ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "perl-debug": "5.18.2-2ubuntu1.1",
            "perl": "5.18.2-2ubuntu1.1",
            "perl-modules": "5.18.2-2ubuntu1.1",
            "libperl-dev": "5.18.2-2ubuntu1.1",
            "libperl5.18": "5.18.2-2ubuntu1.1",
            "libcgi-fast-perl": "5.18.2-2ubuntu1.1",
            "perl-doc": "5.18.2-2ubuntu1.1",
            "perl-base": "5.18.2-2ubuntu1.1"
        }
    ]
}