It was discovered that Perl was not properly verifying TLS certificates when using CPAN together with HTTP::Tiny to download modules over HTTPS. If a remote attacker were able to intercept communications, this flaw could potentially be used to install altered modules.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "perl-debug": "5.18.2-2ubuntu1.7+esm5", "perl": "5.18.2-2ubuntu1.7+esm5", "perl-modules": "5.18.2-2ubuntu1.7+esm5", "libperl-dev": "5.18.2-2ubuntu1.7+esm5", "libperl5.18": "5.18.2-2ubuntu1.7+esm5", "libcgi-fast-perl": "5.18.2-2ubuntu1.7+esm5", "perl-doc": "5.18.2-2ubuntu1.7+esm5", "perl-base": "5.18.2-2ubuntu1.7+esm5" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "perl-debug": "5.22.1-9ubuntu0.9+esm2", "perl": "5.22.1-9ubuntu0.9+esm2", "perl-modules-5.22": "5.22.1-9ubuntu0.9+esm2", "libperl-dev": "5.22.1-9ubuntu0.9+esm2", "libperl5.22": "5.22.1-9ubuntu0.9+esm2", "perl-doc": "5.22.1-9ubuntu0.9+esm2", "perl-base": "5.22.1-9ubuntu0.9+esm2" } ] }
{ "availability": "No subscription required", "binaries": [ { "perl-debug": "5.26.1-6ubuntu0.7", "perl": "5.26.1-6ubuntu0.7", "libperl-dev": "5.26.1-6ubuntu0.7", "libperl5.26": "5.26.1-6ubuntu0.7", "perl-doc": "5.26.1-6ubuntu0.7", "perl-base": "5.26.1-6ubuntu0.7", "perl-modules-5.26": "5.26.1-6ubuntu0.7" } ] }