USN-6112-1: Perl vulnerability

Publication date

29 May 2023

Overview

Perl could be made to install modules from untrusted sources.


Packages

  • perl - Practical Extraction and Report Language

Details

It was discovered that Perl was not properly verifying TLS certificates
when using CPAN together with HTTP::Tiny to download modules over HTTPS.
If a remote attacker were able to intercept communications, this flaw
could potentially be used to install altered modules.

It was discovered that Perl was not properly verifying TLS certificates
when using CPAN together with HTTP::Tiny to download modules over HTTPS.
If a remote attacker were able to intercept communications, this flaw
could potentially be used to install altered modules.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
18.04 bionic perl –  5.26.1-6ubuntu0.7
16.04 xenial perl –  5.22.1-9ubuntu0.9+esm2  
14.04 trusty perl –  5.18.2-2ubuntu1.7+esm5  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›