Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0966

Опубликовано: 05 нояб. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0966: Important: perl security update (IMPORTANT)

[5.8.5-36.el4_5.2.0.1]

  • Added patch perl-5.8.5-OEL-mock-build.patch to disable test lib/Net/t/hostname.t, so that mock build succeeds

[5.8.5-36.el4.2]

  • Resolves: bug#323791
  • fix previous patch

[5.8.5-36.el4.1]

  • Resolves: bug#323791
  • fix regular expression UTF parsing errors

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

perl

5.8.8-10.0.1.el5_0.2

perl-suidperl

5.8.8-10.0.1.el5_0.2

Oracle Linux i386

perl

5.8.8-10.0.1.el5_0.2

perl-suidperl

5.8.8-10.0.1.el5_0.2

Связанные CVE

Связанные уязвимости

ubuntu
больше 17 лет назад

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

redhat
больше 17 лет назад

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

nvd
больше 17 лет назад

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

debian
больше 17 лет назад

Buffer overflow in the polymorphic opcode support in the Regular Expre ...

github
около 3 лет назад

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

Уязвимость ELSA-2007-0966