dwww Home | Show directory contents | Find package

perl (5.34.0-3ubuntu1.3) jammy-security; urgency=medium

  * SECURITY UPDATE: heap overflow via regular expression
    - debian/patches/CVE-2023-47038.patch: fix read/write past buffer end
      in regcomp.c, t/re/pat_advanced.t.
    - CVE-2023-47038
  * SECURITY UPDATE: infinite recursion via warning message printing
    - debian/patches/CVE-2022-48522.patch: fix warning handling in sv.c,
      t/lib/warnings/sv.
    - CVE-2022-48522

 -- Marc Deslauriers <marc.deslauriers@ubuntu.com>  Thu, 23 Nov 2023 09:56:46 -0500

perl (5.34.0-3ubuntu1.2) jammy-security; urgency=medium

  * SECURITY UPDATE: insecure default TLS configuration in HTTP::Tiny module
    - debian/patches/CVE-2023-31484.patch: add verify_SSL=>1 to HTTP::Tiny to
      verify https server identity.
    - CVE-2023-31484

 -- Camila Camargo de Matos <camila.camargodematos@canonical.com>  Tue, 23 May 2023 14:18:13 -0300

perl (5.34.0-3ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Signature verification bypass
    - debian/patches/CVE-2020-16156-1.patch: signature
      verification type CANNOT_VERIFY was not recognized
      in cpan/CPAN/lib/CPAN/Distribution.pm.
    - debia/patches/CVE-2020-16156-2.patch: add two new failure modes
      in cpan/CPAN/lib/CPAN/Distribution.pm.
    - debian/patches/CVE-2020-16156-3.patch: use gpg
      to disentangle data and signature in cpan/CPAN/lib/CPAN/Distribution.pm.
    - debian/patches/CVE-2020-16156-4.patch: replacing die with mydie in
      three spots in cpan/CPAN/lib/CPAN/Distribution.pm.
    - debian/patches/CVE-2020-16156-5.patch: disambiguate the call
      to gpg --output by adding --verify in
      cpan/CPAN/lib/CPAN/Distribution.pm.
    - debian/patches/CVE-2020-16156-6.patch: corrects typo
      in cpan/CPAN/lib/CPAN/Distribution.pm.
    - debian/patches/CVE-2020-16156-7.patch: corrects typo
      in cpan/CPAN/lib/CPAN/Distribution.pm.
    - CVE-2020-16156

 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com>  Tue, 04 Oct 2022 15:16:23 -0300

perl (5.34.0-3ubuntu1) jammy; urgency=medium

  * Merge with Debian; remaining changes:
    - Disable two porting/libperl.t tests, only run on x86*, and only
      testing the static libperl.a.
    - Disable the same porting/libperl.t tests on x86*, as on the other
      Linux architectures.

 -- Matthias Klose <doko@ubuntu.com>  Sun, 06 Feb 2022 12:02:58 +0100

perl (5.34.0-3) unstable; urgency=medium

  * Add 5.34.0 to debian/released-versions.
  * Upload to unstable.

 -- Niko Tyni <ntyni@debian.org>  Sat, 05 Feb 2022 12:20:54 +0200

perl (5.34.0-2) experimental; urgency=medium

  * Apply upstream patch fixing issues with gdbm 1.20. (Closes: #993514)

 -- Niko Tyni <ntyni@debian.org>  Fri, 27 Aug 2021 22:02:26 +0300

perl (5.34.0-1) experimental; urgency=medium

  * Update to new upstream version 5.34.0.
  * Add a build time sanity check to make sure we filter away generated
    files from the regen-configure tarball. (Closes: #992200)
  * Fix usrmerge related reproducibility issues. Thanks to Vagrant
    Cascadian. (Closes: #914128)
  * Update cross build support files.
  * Skip io/msg.t on x32 due to broken System V message queues.
    (See #988900)
  * [SECURITY] CVE-2021-36770: Encode loading code from working directory

 -- Niko Tyni <ntyni@debian.org>  Thu, 26 Aug 2021 21:20:41 +0300

perl (5.34.0~rc2-1) experimental; urgency=medium

  * Update to upstream release candidate 5.34.0-RC2.
    + File::Temp file creation permissions are documented now.
      (Closes: #987995)

 -- Niko Tyni <ntyni@debian.org>  Mon, 17 May 2021 22:09:52 +0300

perl (5.32.1-6ubuntu1) jammy; urgency=medium

  * Merge with Debian; remaining changes:
    - Disable two porting/libperl.t tests, only run on x86*, and only
      testing the static libperl.a.
    - Disable the same porting/libperl.t tests on x86*, as on the other
      Linux architectures.

 -- Matthias Klose <doko@ubuntu.com>  Fri, 04 Feb 2022 22:49:31 +0100

perl (5.32.1-4) unstable; urgency=medium

  * Add perl Breaks: perl-modules-5.22 and early versions of
    perl-modules-5.26. They had the same issue as perl-modules-5.24,
    which perl already Breaks since 5.32.0-6. (Closes: #976704)

 -- Niko Tyni <ntyni@debian.org>  Thu, 29 Apr 2021 21:37:46 +0300

# For older changelog entries, run 'apt-get changelog perl-base'

Generated by dwww version 1.14 on Thu Jan 23 06:01:44 CET 2025.