Lmao, just send an email with "unsubscribe" in it to
debian-security@lists.debian.org
On Mar 1, 2016 1:03 PM, "James Barrett" <xuc...@gmail.com> wrote:

> Unsubscribe me or I will spam your list
> On Mar 1, 2016 10:28 AM, "Salvatore Bonaccorso" <car...@debian.org> wrote:
>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA512
>>
>> -
>> -------------------------------------------------------------------------
>> Debian Security Advisory DSA-3501-1                   secur...@debian.org
>> https://www.debian.org/security/                     Salvatore Bonaccorso
>> March 01, 2016                        https://www.debian.org/security/faq
>> -
>> -------------------------------------------------------------------------
>>
>> Package        : perl
>> CVE ID         : CVE-2016-2381
>>
>> Stephane Chazelas discovered a bug in the environment handling in Perl.
>> Perl provides a Perl-space hash variable, %ENV, in which environment
>> variables can be looked up.  If a variable appears twice in envp, only
>> the last value would appear in %ENV, but getenv would return the first.
>> Perl's taint security mechanism would be applied to the value in %ENV,
>> but not to the other rest of the environment.  This could result in an
>> ambiguous environment causing environment variables to be propagated to
>> subprocesses, despite the protections supposedly offered by taint
>> checking.
>>
>> With this update Perl changes the behavior to match the following:
>>
>>  a) %ENV is populated with the first environment variable, as getenv
>>     would return.
>>  b) Duplicate environment entries are removed.
>>
>> For the oldstable distribution (wheezy), this problem has been fixed
>> in version 5.14.2-21+deb7u3.
>>
>> For the stable distribution (jessie), this problem has been fixed in
>> version 5.20.2-3+deb8u4.
>>
>> For the unstable distribution (sid), this problem will be fixed in
>> version 5.22.1-8.
>>
>> We recommend that you upgrade your perl packages.
>>
>> Further information about Debian Security Advisories, how to apply
>> these updates to your system and frequently asked questions can be
>> found at: https://www.debian.org/security/
>>
>> Mailing list: debian-security-annou...@lists.debian.org
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1
>>
>> iQIcBAEBCgAGBQJW1bTDAAoJEAVMuPMTQ89En28P/3uLGpzAppXhj4Hik/2lG/Tl
>> +UspDr3Dyl2CSeKmLK/iPexhp66R2fTu3FX0QWvNznYlVe9goQpWAK1fMpFitagO
>> LL3dJgal0dy+pHLmUkqIr1IllEdMoW69Wk0/a6n8Ko0upG7Bjb5BthRtC6EfLdW6
>> xYND4pzAPENxBmWsgMv1E2gP2FZesPZAmnNM7DjKmOe7uSF5gw3hplZ2Mufkj4oI
>> HIzG248UyhNkCOkYw2uzI8vpeEktzsAnkNgQQzfBtI9aW+4uL8c9JYHztkYUuzWP
>> wqZygN4aIvS8IzlDqQ40jQSqqHM97StAfTJ7vIP6bK8uMTD9tccYCEN0j1OCiTHS
>> e5h3ZbYhdTgWGHDfwZHkmQcfkhAOXjkNu8gxvf4XrXaSXInJwXCtOC9V3It/PrAs
>> gpKug9vC2qhTgNIOqX2JqayoVIH2rtPTfsoYDnl7GKyFs0GsWhrr6h1DR+xTxA8x
>> INrL7MbgF2ydqNnqmp7YAdJAc8c3H8YrW/ERiuW4r/YvD/pUwqbJaF6NFUIqB3v0
>> o+24ymPgqGQrK08oopNwkgByQs5JvkcOLZKUpos0puwJTZ4f492WFgwFQQOo+V3j
>> pFqcNE9d4LswV+Dymbi8//hpkiT+qL6+N4uTULx5pCUO0KzQD4L2+9Fg4ReO//NI
>> BhdHUyds14H7iDdAZvC5
>> =WDZ9
>> -----END PGP SIGNATURE-----
>>
>>

Reply via email to