perl (5.10.1-8ubuntu2.1) lucid-security; urgency=low

  * SECURITY UPDATE: multiple intended restriction bypasses in Safe.pm
    - debian/patches/debian/CVE-2010-1168.diff: update Safe.pm to version
      2.29 to fix multiple issues.
    - CVE-2010-1168
    - CVE-2010-1447
  * SECURITY UPDATE: multiple issues in CGI.pm: hardcoded MIME boundary,
    and CRLF injections.
    - debian/patches/fixes/cgi-multiline-header.diff: fix issues with
      patch obtained from (5.10.1-17).
    - CVE-2010-2716
    - CVE-2010-4410
    - CVE-2010-4411
  * SECURITY UPDATE: taint protection bypass via missing taint attributes
    - debian/patches/fixes/CVE-2011-1487.diff: put taint logic at the end
      of pp_* functions.
    - CVE-2011-1487

Date: Thu, 21 Apr 2011 13:22:49 -0400
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
https://launchpad.net/ubuntu/lucid/+source/perl/5.10.1-8ubuntu2.1
Format: 1.8
Date: Thu, 21 Apr 2011 13:22:49 -0400
Source: perl
Binary: perl-base libcgi-fast-perl perl-doc perl-modules perl-debug perl-suid 
libperl5.10 libperl-dev perl
Architecture: source
Version: 5.10.1-8ubuntu2.1
Distribution: lucid-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Description: 
 libcgi-fast-perl - CGI::Fast Perl module
 libperl-dev - Perl library: development files
 libperl5.10 - shared Perl library
 perl       - Larry Wall's Practical Extraction and Report Language
 perl-base  - minimal Perl system
 perl-debug - debug-enabled Perl interpreter
 perl-doc   - Perl documentation
 perl-modules - Core Perl modules
 perl-suid  - runs setuid Perl scripts
Changes: 
 perl (5.10.1-8ubuntu2.1) lucid-security; urgency=low
 .
   * SECURITY UPDATE: multiple intended restriction bypasses in Safe.pm
     - debian/patches/debian/CVE-2010-1168.diff: update Safe.pm to version
       2.29 to fix multiple issues.
     - CVE-2010-1168
     - CVE-2010-1447
   * SECURITY UPDATE: multiple issues in CGI.pm: hardcoded MIME boundary,
     and CRLF injections.
     - debian/patches/fixes/cgi-multiline-header.diff: fix issues with
       patch obtained from (5.10.1-17).
     - CVE-2010-2716
     - CVE-2010-4410
     - CVE-2010-4411
   * SECURITY UPDATE: taint protection bypass via missing taint attributes
     - debian/patches/fixes/CVE-2011-1487.diff: put taint logic at the end
       of pp_* functions.
     - CVE-2011-1487
Checksums-Sha1: 
 ab13b7d826b2f424ba6fb22c4a0707b46d0fd675 2110 perl_5.10.1-8ubuntu2.1.dsc
 6940c928693251bbb9bb18bc54625ac3d06f43b0 118283 perl_5.10.1-8ubuntu2.1.diff.gz
Checksums-Sha256: 
 31dbdb6fcb509430111f992e4af537852c2ec40c4156194a0b63aca2433e70be 2110 
perl_5.10.1-8ubuntu2.1.dsc
 aabd4982e9d144076053144909806e016d7bfa0265142a486d5617493921c31f 118283 
perl_5.10.1-8ubuntu2.1.diff.gz
Files: 
 37e72e62c1fbd67a7acff4588571fa5f 2110 perl standard perl_5.10.1-8ubuntu2.1.dsc
 b09bf4c1fc2a79c5d090ded735a12b3f 118283 perl standard 
perl_5.10.1-8ubuntu2.1.diff.gz
Original-Maintainer: Niko Tyni <nt...@debian.org>
-- 
Lucid-changes mailing list
Lucid-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/lucid-changes

Reply via email to