Описание
ELSA-2007-0966: Important: perl security update (IMPORTANT)
[5.8.5-36.el4_5.2.0.1]
- Added patch perl-5.8.5-OEL-mock-build.patch to disable test lib/Net/t/hostname.t, so that mock build succeeds
[5.8.5-36.el4.2]
- Resolves: bug#323791
- fix previous patch
[5.8.5-36.el4.1]
- Resolves: bug#323791
- fix regular expression UTF parsing errors
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
perl
5.8.8-10.0.1.el5_0.2
perl-suidperl
5.8.8-10.0.1.el5_0.2
Oracle Linux i386
perl
5.8.8-10.0.1.el5_0.2
perl-suidperl
5.8.8-10.0.1.el5_0.2
Связанные CVE
Связанные уязвимости
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Buffer overflow in the polymorphic opcode support in the Regular Expre ...
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.