SUSE-SU-2018:1074-1: moderate: Security update for perl

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed Apr 25 10:10:56 MDT 2018


   SUSE Security Update: Security update for perl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:1074-1
Rating:             moderate
References:         #1082216 #1082233 #1082234 
Cross-References:   CVE-2018-6797 CVE-2018-6798 CVE-2018-6913
                   
Affected Products:
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE CaaS Platform ALL
                    OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for perl fixes the following issues:

   Security issues fixed:

   - CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
   - CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
   - CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-730=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-730=1

   - SUSE CaaS Platform ALL:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

   - OpenStack Cloud Magnum Orchestration 7:

      zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-730=1



Package List:

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      perl-5.18.2-12.11.1
      perl-base-5.18.2-12.11.1
      perl-base-debuginfo-5.18.2-12.11.1
      perl-debuginfo-5.18.2-12.11.1
      perl-debugsource-5.18.2-12.11.1

   - SUSE Linux Enterprise Server 12-SP3 (s390x x86_64):

      perl-32bit-5.18.2-12.11.1
      perl-debuginfo-32bit-5.18.2-12.11.1

   - SUSE Linux Enterprise Server 12-SP3 (noarch):

      perl-doc-5.18.2-12.11.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      perl-32bit-5.18.2-12.11.1
      perl-5.18.2-12.11.1
      perl-base-5.18.2-12.11.1
      perl-base-debuginfo-5.18.2-12.11.1
      perl-debuginfo-32bit-5.18.2-12.11.1
      perl-debuginfo-5.18.2-12.11.1
      perl-debugsource-5.18.2-12.11.1

   - SUSE Linux Enterprise Desktop 12-SP3 (noarch):

      perl-doc-5.18.2-12.11.1

   - SUSE CaaS Platform ALL (x86_64):

      perl-5.18.2-12.11.1
      perl-base-5.18.2-12.11.1
      perl-base-debuginfo-5.18.2-12.11.1
      perl-debuginfo-5.18.2-12.11.1
      perl-debugsource-5.18.2-12.11.1

   - OpenStack Cloud Magnum Orchestration 7 (x86_64):

      perl-5.18.2-12.11.1
      perl-base-5.18.2-12.11.1
      perl-base-debuginfo-5.18.2-12.11.1
      perl-debuginfo-5.18.2-12.11.1
      perl-debugsource-5.18.2-12.11.1


References:

   https://www.suse.com/security/cve/CVE-2018-6797.html
   https://www.suse.com/security/cve/CVE-2018-6798.html
   https://www.suse.com/security/cve/CVE-2018-6913.html
   https://bugzilla.suse.com/1082216
   https://bugzilla.suse.com/1082233
   https://bugzilla.suse.com/1082234



More information about the sle-updates mailing list