[Bug 1153444] [NEW] Please sync perl 5.14.2-20 (main) from Debian unstable (main)

Dmitry Shachnev mitya57 at gmail.com
Mon Mar 11 05:13:12 UTC 2013


Public bug reported:

https://launchpad.net/debian/+source/perl/5.14.2-20

Changelog entries since current raring version 5.14.2-18:

perl (5.14.2-20) unstable; urgency=low

  * Fix an Encode memory leak that occurred in the UTF-8 encoding.
    (Closes: #702416)
    + upgrade the Broken versions of the separate libencode-perl
      package accordingly.

 -- Niko Tyni <ntyni at debian.org>  Thu, 07 Mar 2013 19:08:47 +0200

perl (5.14.2-19) unstable; urgency=high

  * [SECURITY] CVE-2013-1667: fix a rehashing DoS opportunity
    against code that uses arbitrary user input as hash keys.
    (Closes: #702296)

 -- Niko Tyni <ntyni at debian.org>  Tue, 05 Mar 2013 21:38:26 +0200

** Affects: perl (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: raring

** Description changed:

- https://launchpad.net/debian/+source/perl/5.14.2-18
+ https://launchpad.net/debian/+source/perl/5.14.2-20
  
  Changelog entries since current raring version 5.14.2-18:
  
  perl (5.14.2-20) unstable; urgency=low
  
-   * Fix an Encode memory leak that occurred in the UTF-8 encoding.
-     (Closes: #702416)
-     + upgrade the Broken versions of the separate libencode-perl
-       package accordingly.
+   * Fix an Encode memory leak that occurred in the UTF-8 encoding.
+     (Closes: #702416)
+     + upgrade the Broken versions of the separate libencode-perl
+       package accordingly.
  
-  -- Niko Tyni <ntyni at debian.org>  Thu, 07 Mar 2013 19:08:47 +0200
+  -- Niko Tyni <ntyni at debian.org>  Thu, 07 Mar 2013 19:08:47 +0200
  
  perl (5.14.2-19) unstable; urgency=high
  
-   * [SECURITY] CVE-2013-1667: fix a rehashing DoS opportunity
-     against code that uses arbitrary user input as hash keys.
-     (Closes: #702296)
+   * [SECURITY] CVE-2013-1667: fix a rehashing DoS opportunity
+     against code that uses arbitrary user input as hash keys.
+     (Closes: #702296)
  
-  -- Niko Tyni <ntyni at debian.org>  Tue, 05 Mar 2013 21:38:26 +0200
+  -- Niko Tyni <ntyni at debian.org>  Tue, 05 Mar 2013 21:38:26 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to perl in Ubuntu.
https://bugs.launchpad.net/bugs/1153444

Title:
  Please sync perl 5.14.2-20 (main) from Debian unstable (main)

Status in “perl” package in Ubuntu:
  New

Bug description:
  https://launchpad.net/debian/+source/perl/5.14.2-20

  Changelog entries since current raring version 5.14.2-18:

  perl (5.14.2-20) unstable; urgency=low

    * Fix an Encode memory leak that occurred in the UTF-8 encoding.
      (Closes: #702416)
      + upgrade the Broken versions of the separate libencode-perl
        package accordingly.

   -- Niko Tyni <ntyni at debian.org>  Thu, 07 Mar 2013 19:08:47 +0200

  perl (5.14.2-19) unstable; urgency=high

    * [SECURITY] CVE-2013-1667: fix a rehashing DoS opportunity
      against code that uses arbitrary user input as hash keys.
      (Closes: #702296)

   -- Niko Tyni <ntyni at debian.org>  Tue, 05 Mar 2013 21:38:26 +0200

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/perl/+bug/1153444/+subscriptions




More information about the foundations-bugs mailing list