{"affected":[{"ecosystem_specific":{"binaries":[{"perl":"5.18.2-12.14.1","perl-32bit":"5.18.2-12.14.1","perl-base":"5.18.2-12.14.1","perl-doc":"5.18.2-12.14.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"perl","purl":"pkg:rpm/suse/perl&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.18.2-12.14.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for perl fixes the following issues:\n\nThese security issue were fixed: \n\n- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).\n- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).\n- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).\n- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a\n  directory-traversal protection mechanism and overwrite arbitrary files\n  (bsc#1096718)\n\nThis non-security issue was fixed: \n\n- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]\n\n","id":"SUSE-SU-2018:1972-2","modified":"2018-10-18T12:47:55Z","published":"2018-10-18T12:47:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181972-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1068565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082234"},{"type":"REPORT","url":"https://bugzilla.suse.com/1096718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-12015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-6797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-6798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-6913"}],"related":["CVE-2018-12015","CVE-2018-6797","CVE-2018-6798","CVE-2018-6913"],"summary":"Security update for perl","upstream":["CVE-2018-12015","CVE-2018-6797","CVE-2018-6798","CVE-2018-6913"]}