SUSE-SU-2020:1682-1: important: Security update for perl
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Jun 19 07:16:10 MDT 2020
SUSE Security Update: Security update for perl
______________________________________________________________________________
Announcement ID: SUSE-SU-2020:1682-1
Rating: important
References: #1171863 #1171864 #1171866 #1172348
Cross-References: CVE-2020-10543 CVE-2020-10878 CVE-2020-12723
Affected Products:
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
SUSE Linux Enterprise Module for Development Tools 15-SP2
SUSE Linux Enterprise Module for Development Tools 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP2
SUSE Linux Enterprise Module for Basesystem 15-SP1
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression
compiler which could have allowed overwriting of allocated memory with
attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have
allowed the insertion of instructions into the compiled form of Perl
regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate
language state of a compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-1682=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2020-1682=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1682=1
- SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2020-1682=1
- SUSE Linux Enterprise Module for Development Tools 15-SP1:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP1-2020-1682=1
- SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-1682=1
- SUSE Linux Enterprise Module for Basesystem 15-SP1:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-1682=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-1682=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-1682=1
Package List:
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
perl-5.26.1-7.12.1
perl-base-5.26.1-7.12.1
perl-base-debuginfo-5.26.1-7.12.1
perl-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise Server for SAP 15 (noarch):
perl-doc-5.26.1-7.12.1
- SUSE Linux Enterprise Server for SAP 15 (x86_64):
perl-32bit-debuginfo-5.26.1-7.12.1
perl-base-32bit-5.26.1-7.12.1
perl-base-32bit-debuginfo-5.26.1-7.12.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
perl-5.26.1-7.12.1
perl-base-5.26.1-7.12.1
perl-base-debuginfo-5.26.1-7.12.1
perl-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise Server 15-LTSS (noarch):
perl-doc-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (x86_64):
perl-32bit-5.26.1-7.12.1
perl-32bit-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch):
perl-doc-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Development Tools 15-SP1 (noarch):
perl-doc-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):
perl-5.26.1-7.12.1
perl-base-5.26.1-7.12.1
perl-base-debuginfo-5.26.1-7.12.1
perl-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):
perl-32bit-debuginfo-5.26.1-7.12.1
perl-base-32bit-5.26.1-7.12.1
perl-base-32bit-debuginfo-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64):
perl-5.26.1-7.12.1
perl-base-5.26.1-7.12.1
perl-base-debuginfo-5.26.1-7.12.1
perl-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (x86_64):
perl-32bit-debuginfo-5.26.1-7.12.1
perl-base-32bit-5.26.1-7.12.1
perl-base-32bit-debuginfo-5.26.1-7.12.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
perl-5.26.1-7.12.1
perl-base-5.26.1-7.12.1
perl-base-debuginfo-5.26.1-7.12.1
perl-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
perl-doc-5.26.1-7.12.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
perl-32bit-debuginfo-5.26.1-7.12.1
perl-base-32bit-5.26.1-7.12.1
perl-base-32bit-debuginfo-5.26.1-7.12.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
perl-5.26.1-7.12.1
perl-base-5.26.1-7.12.1
perl-base-debuginfo-5.26.1-7.12.1
perl-debuginfo-5.26.1-7.12.1
perl-debugsource-5.26.1-7.12.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
perl-32bit-debuginfo-5.26.1-7.12.1
perl-base-32bit-5.26.1-7.12.1
perl-base-32bit-debuginfo-5.26.1-7.12.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
perl-doc-5.26.1-7.12.1
References:
https://www.suse.com/security/cve/CVE-2020-10543.html
https://www.suse.com/security/cve/CVE-2020-10878.html
https://www.suse.com/security/cve/CVE-2020-12723.html
https://bugzilla.suse.com/1171863
https://bugzilla.suse.com/1171864
https://bugzilla.suse.com/1171866
https://bugzilla.suse.com/1172348
More information about the sle-security-updates
mailing list