Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 14 Aug 2016 12:43:26 -0700
From:      "Ken J." <tweakerz@shaw.ca>
To:        <perl@FreeBSD.org>
Subject:   perl5-5.20.3_14 has known vulnerabilities
Message-ID:  <79E8A2ABDBA64869B3E252D130AFA7EB@MCS2>

next in thread | raw e-mail | index | archive | help
Hi There,

Any ideas when the port will be updated to fix this?

perl5-5.20.3_14 is vulnerable:
p5-XSLoader -- local arbitrary code execution
CVE: CVE-2016-6185
WWW: =
https://vuxml.FreeBSD.org/freebsd/3e08047f-5a6c-11e6-a6c3-14dae9d210b8.ht=
ml

1 problem(s) in the installed packages found.
=3D> Please update your ports tree and try again.
=3D> Note: Vulnerable ports are marked as such even if there is no =
update available.
=3D> If you wish to ignore this vulnerability rebuild with 'make =
DISABLE_VULNERABILITIES=3Dyes'
*** Error code 1

Thanks,

Ken
From owner-freebsd-perl@freebsd.org  Sun Aug 14 19:50:54 2016
Return-Path: <owner-freebsd-perl@freebsd.org>
Delivered-To: freebsd-perl@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 667ACBBAAD8
 for <freebsd-perl@mailman.ysv.freebsd.org>;
 Sun, 14 Aug 2016 19:50:54 +0000 (UTC) (envelope-from lists@opsec.eu)
Received: from mailman.ysv.freebsd.org (unknown [127.0.1.3])
 by mx1.freebsd.org (Postfix) with ESMTP id 56F76150A
 for <freebsd-perl@freebsd.org>; Sun, 14 Aug 2016 19:50:54 +0000 (UTC)
 (envelope-from lists@opsec.eu)
Received: by mailman.ysv.freebsd.org (Postfix)
 id 565CEBBAAD7; Sun, 14 Aug 2016 19:50:54 +0000 (UTC)
Delivered-To: perl@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id 56008BBAAD6
 for <perl@mailman.ysv.freebsd.org>; Sun, 14 Aug 2016 19:50:54 +0000 (UTC)
 (envelope-from lists@opsec.eu)
Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id 1C3241508
 for <perl@FreeBSD.org>; Sun, 14 Aug 2016 19:50:54 +0000 (UTC)
 (envelope-from lists@opsec.eu)
Received: from pi by home.opsec.eu with local (Exim 4.87 (FreeBSD))
 (envelope-from <lists@opsec.eu>)
 id 1bZ1Qs-0003qD-G7; Sun, 14 Aug 2016 21:50:54 +0200
Date: Sun, 14 Aug 2016 21:50:54 +0200
From: Kurt Jaeger <lists@opsec.eu>
To: "Ken J." <tweakerz@shaw.ca>
Cc: perl@FreeBSD.org
Subject: Re: perl5-5.20.3_14 has known vulnerabilities
Message-ID: <20160814195054.GJ96200@home.opsec.eu>
References: <79E8A2ABDBA64869B3E252D130AFA7EB@MCS2>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <79E8A2ABDBA64869B3E252D130AFA7EB@MCS2>
X-BeenThere: freebsd-perl@freebsd.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: maintainer of a number of perl-related ports
 <freebsd-perl.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-perl>,
 <mailto:freebsd-perl-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-perl/>;
List-Post: <mailto:freebsd-perl@freebsd.org>
List-Help: <mailto:freebsd-perl-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-perl>,
 <mailto:freebsd-perl-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Aug 2016 19:50:54 -0000

Hi!

> Any ideas when the port will be updated to fix this?

See

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=211816

-- 
pi@opsec.eu            +49 171 3101372                         4 years to go !



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?79E8A2ABDBA64869B3E252D130AFA7EB>