CVE-2016-2381 (retired)

Priority
Description
Perl might allow context-dependent attackers to bypass the taint protection
mechanism in a child process via duplicate environment variables in envp.
Assigned-to
mdeslaur
Package
Source: perl (LP Ubuntu Debian)
Upstream:released (5.22.1-8)
Ubuntu 12.04 ESM (Precise Pangolin):released (5.14.2-6ubuntu2.5)
Ubuntu 14.04 LTS (Trusty Tahr):released (5.18.2-2ubuntu1.1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (5.22.1-8)
Patches:
Upstream:http://perl5.git.perl.org/perl.git/commit/ae37b791a73a9e78dedb89fb2429d2628cf58076
Upstream:http://perl5.git.perl.org/perl.git/commit/9dee5840e63e586718b283d542c830b0e0514aab (vms only)
More Information

Updated: 2019-03-26 12:19:22 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)