diff options
author | David Mitchell <davem@iabyn.com> | 2013-03-07 14:06:11 +0000 |
---|---|---|
committer | David Mitchell <davem@iabyn.com> | 2013-03-07 15:08:29 +0000 |
commit | d8edf93c10267990cb6471d9626df21a867a9867 (patch) | |
tree | 1de86ef108ea20a1879b048666134f052b881910 | |
parent | cabaa53059292b516f879f224fd9dcc60117cc8f (diff) | |
download | perl-d8edf93c10267990cb6471d9626df21a867a9867.tar.gz |
update perldelta with Encode fix
-rw-r--r-- | pod/perldelta.pod | 13 |
1 files changed, 10 insertions, 3 deletions
diff --git a/pod/perldelta.pod b/pod/perldelta.pod index 4f55fde2ef..2e2eca3b59 100644 --- a/pod/perldelta.pod +++ b/pod/perldelta.pod @@ -19,9 +19,9 @@ No changes since 5.14.0. =head1 Security -This release contains one major and a number of minor security fixes. -The latter are included mainly to allow the test suite to pass cleanly -with the clang compiler's address sanitizer facility. +This release contains one major, and medium, and a number of minor +security fixes. The latter are included mainly to allow the test suite to +pass cleanly with the clang compiler's address sanitizer facility. =head2 CVE-2013-1667: memory exhaustion with arbitrary hash keys @@ -31,6 +31,11 @@ and CPU, and thus possibly to achieve a Denial-of-Service. This problem has been fixed. +=head2 memory leak in Encode + +The UTF-8 encoding implementation in Encode.xs had a memory leak which has been +fixed. + =head2 [perl #111594] Socket::unpack_sockaddr_un heap-buffer-overflow A read buffer overflow could occur when copying C<sockaddr> buffers. @@ -103,6 +108,8 @@ L</Security> (version numbers have not changed): =back +L<Encode> has been upgraded from version 2.42_01 to version 2.42_02. + L<Module::CoreList> has been updated to version 2.49_05 to add data for this release. |