First published: Fri Apr 08 2016(Updated: )
Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Perl | <5.23.9 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Oracle Communications Billing and Revenue Management | =7.5 | |
Oracle Configuration Manager | <12.1.2.0.4 | |
Oracle Configuration Manager | =12.1.2.0.6 | |
Oracle Database Server | =11.2.0.4 | |
Oracle Database Server | =12.1.0.2 | |
Oracle Database Server | =12.2.0.1 | |
Oracle Database Server | =18c | |
Oracle Database Server | =19c | |
Oracle Enterprise Manager Base Platform | =13.2.0.0.0 | |
Oracle Enterprise Manager Base Platform | =13.3.0.0.0 | |
Oracle TimesTen In-Memory Database | <18.1.2.1.0 | |
Oracle Solaris | =11.3 | |
openSUSE openSUSE | =13.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.