CVE-2016-2381

Priority
Medium
Description
Perl might allow context-dependent attackers to bypass the taint protection
mechanism in a child process via duplicate environment variables in envp.
References
Assigned-to
mdeslaur
Package
Source: perl (LP Ubuntu Debian)
Upstream:released (5.22.1-8)
Ubuntu 17.10 (Artful Aardvark):not-affected (5.22.1-8)
Ubuntu 12.04 ESM (Precise Pangolin):released (5.14.2-6ubuntu2.5)
Ubuntu 14.04 LTS (Trusty Tahr):released (5.18.2-2ubuntu1.1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (5.22.1-8)
Ubuntu 17.04 (Zesty Zapus):not-affected (5.22.1-8)
Patches:
Upstream:http://perl5.git.perl.org/perl.git/commit/ae37b791a73a9e78dedb89fb2429d2628cf58076
Upstream:http://perl5.git.perl.org/perl.git/commit/9dee5840e63e586718b283d542c830b0e0514aab (vms only)
More Information

Updated: 2017-10-17 19:14:17 UTC (commit 13537)