perl (5.34.0-3ubuntu1.3) jammy-security; urgency=medium * SECURITY UPDATE: heap overflow via regular expression - debian/patches/CVE-2023-47038.patch: fix read/write past buffer end in regcomp.c, t/re/pat_advanced.t. - CVE-2023-47038 * SECURITY UPDATE: infinite recursion via warning message printing - debian/patches/CVE-2022-48522.patch: fix warning handling in sv.c, t/lib/warnings/sv. - CVE-2022-48522 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 23 Nov 2023 09:56:46 -0500 perl (5.34.0-3ubuntu1.2) jammy-security; urgency=medium * SECURITY UPDATE: insecure default TLS configuration in HTTP::Tiny module - debian/patches/CVE-2023-31484.patch: add verify_SSL=>1 to HTTP::Tiny to verify https server identity. - CVE-2023-31484 -- Camila Camargo de Matos <camila.camargodematos@canonical.com> Tue, 23 May 2023 14:18:13 -0300 perl (5.34.0-3ubuntu1.1) jammy-security; urgency=medium * SECURITY UPDATE: Signature verification bypass - debian/patches/CVE-2020-16156-1.patch: signature verification type CANNOT_VERIFY was not recognized in cpan/CPAN/lib/CPAN/Distribution.pm. - debia/patches/CVE-2020-16156-2.patch: add two new failure modes in cpan/CPAN/lib/CPAN/Distribution.pm. - debian/patches/CVE-2020-16156-3.patch: use gpg to disentangle data and signature in cpan/CPAN/lib/CPAN/Distribution.pm. - debian/patches/CVE-2020-16156-4.patch: replacing die with mydie in three spots in cpan/CPAN/lib/CPAN/Distribution.pm. - debian/patches/CVE-2020-16156-5.patch: disambiguate the call to gpg --output by adding --verify in cpan/CPAN/lib/CPAN/Distribution.pm. - debian/patches/CVE-2020-16156-6.patch: corrects typo in cpan/CPAN/lib/CPAN/Distribution.pm. - debian/patches/CVE-2020-16156-7.patch: corrects typo in cpan/CPAN/lib/CPAN/Distribution.pm. - CVE-2020-16156 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Tue, 04 Oct 2022 15:16:23 -0300 perl (5.34.0-3ubuntu1) jammy; urgency=medium * Merge with Debian; remaining changes: - Disable two porting/libperl.t tests, only run on x86*, and only testing the static libperl.a. - Disable the same porting/libperl.t tests on x86*, as on the other Linux architectures. -- Matthias Klose <doko@ubuntu.com> Sun, 06 Feb 2022 12:02:58 +0100 perl (5.34.0-3) unstable; urgency=medium * Add 5.34.0 to debian/released-versions. * Upload to unstable. -- Niko Tyni <ntyni@debian.org> Sat, 05 Feb 2022 12:20:54 +0200 perl (5.34.0-2) experimental; urgency=medium * Apply upstream patch fixing issues with gdbm 1.20. (Closes: #993514) -- Niko Tyni <ntyni@debian.org> Fri, 27 Aug 2021 22:02:26 +0300 perl (5.34.0-1) experimental; urgency=medium * Update to new upstream version 5.34.0. * Add a build time sanity check to make sure we filter away generated files from the regen-configure tarball. (Closes: #992200) * Fix usrmerge related reproducibility issues. Thanks to Vagrant Cascadian. (Closes: #914128) * Update cross build support files. * Skip io/msg.t on x32 due to broken System V message queues. (See #988900) * [SECURITY] CVE-2021-36770: Encode loading code from working directory -- Niko Tyni <ntyni@debian.org> Thu, 26 Aug 2021 21:20:41 +0300 perl (5.34.0~rc2-1) experimental; urgency=medium * Update to upstream release candidate 5.34.0-RC2. + File::Temp file creation permissions are documented now. (Closes: #987995) -- Niko Tyni <ntyni@debian.org> Mon, 17 May 2021 22:09:52 +0300 perl (5.32.1-6ubuntu1) jammy; urgency=medium * Merge with Debian; remaining changes: - Disable two porting/libperl.t tests, only run on x86*, and only testing the static libperl.a. - Disable the same porting/libperl.t tests on x86*, as on the other Linux architectures. -- Matthias Klose <doko@ubuntu.com> Fri, 04 Feb 2022 22:49:31 +0100 perl (5.32.1-4) unstable; urgency=medium * Add perl Breaks: perl-modules-5.22 and early versions of perl-modules-5.26. They had the same issue as perl-modules-5.24, which perl already Breaks since 5.32.0-6. (Closes: #976704) -- Niko Tyni <ntyni@debian.org> Thu, 29 Apr 2021 21:37:46 +0300 # For older changelog entries, run 'apt-get changelog perl-base'
Generated by dwww version 1.14 on Thu Jan 23 06:01:44 CET 2025.