Описание
ELSA-2013-0685: perl security update (MODERATE)
[4:5.10.1-130]
- Resolves: #915692 - CVE-2012-5526 (newline injection due to improper CRLF escaping in Set-Cookie and P3P headers)
- Resolves: #915692 - CVE-2012-6329 (possible arbitrary code execution via Locale::Maketext)
- Resolves: #915692 - CVE-2013-1667 (DoS in rehashing code)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
perl
5.10.1-130.el6_4
perl-Archive-Extract
0.38-130.el6_4
perl-Archive-Tar
1.58-130.el6_4
perl-CGI
3.51-130.el6_4
perl-CPAN
1.9402-130.el6_4
perl-CPANPLUS
0.88-130.el6_4
perl-Compress-Raw-Bzip2
2.020-130.el6_4
perl-Compress-Raw-Zlib
2.020-130.el6_4
perl-Compress-Zlib
2.020-130.el6_4
perl-Digest-SHA
5.47-130.el6_4
perl-ExtUtils-CBuilder
0.27-130.el6_4
perl-ExtUtils-Embed
1.28-130.el6_4
perl-ExtUtils-MakeMaker
6.55-130.el6_4
perl-ExtUtils-ParseXS
2.2003.0-130.el6_4
perl-File-Fetch
0.26-130.el6_4
perl-IO-Compress-Base
2.020-130.el6_4
perl-IO-Compress-Bzip2
2.020-130.el6_4
perl-IO-Compress-Zlib
2.020-130.el6_4
perl-IO-Zlib
1.09-130.el6_4
perl-IPC-Cmd
0.56-130.el6_4
perl-Locale-Maketext-Simple
0.18-130.el6_4
perl-Log-Message
0.02-130.el6_4
perl-Log-Message-Simple
0.04-130.el6_4
perl-Module-Build
0.3500-130.el6_4
perl-Module-CoreList
2.18-130.el6_4
perl-Module-Load
0.16-130.el6_4
perl-Module-Load-Conditional
0.30-130.el6_4
perl-Module-Loaded
0.02-130.el6_4
perl-Module-Pluggable
3.90-130.el6_4
perl-Object-Accessor
0.34-130.el6_4
perl-Package-Constants
0.02-130.el6_4
perl-Params-Check
0.26-130.el6_4
perl-Parse-CPAN-Meta
1.40-130.el6_4
perl-Pod-Escapes
1.04-130.el6_4
perl-Pod-Simple
3.13-130.el6_4
perl-Term-UI
0.20-130.el6_4
perl-Test-Harness
3.17-130.el6_4
perl-Test-Simple
0.92-130.el6_4
perl-Time-HiRes
1.9721-130.el6_4
perl-Time-Piece
1.15-130.el6_4
perl-core
5.10.1-130.el6_4
perl-devel
5.10.1-130.el6_4
perl-libs
5.10.1-130.el6_4
perl-parent
0.221-130.el6_4
perl-suidperl
5.10.1-130.el6_4
perl-version
0.77-130.el6_4
Oracle Linux i686
perl
5.10.1-130.el6_4
perl-Archive-Extract
0.38-130.el6_4
perl-Archive-Tar
1.58-130.el6_4
perl-CGI
3.51-130.el6_4
perl-CPAN
1.9402-130.el6_4
perl-CPANPLUS
0.88-130.el6_4
perl-Compress-Raw-Bzip2
2.020-130.el6_4
perl-Compress-Raw-Zlib
2.020-130.el6_4
perl-Compress-Zlib
2.020-130.el6_4
perl-Digest-SHA
5.47-130.el6_4
perl-ExtUtils-CBuilder
0.27-130.el6_4
perl-ExtUtils-Embed
1.28-130.el6_4
perl-ExtUtils-MakeMaker
6.55-130.el6_4
perl-ExtUtils-ParseXS
2.2003.0-130.el6_4
perl-File-Fetch
0.26-130.el6_4
perl-IO-Compress-Base
2.020-130.el6_4
perl-IO-Compress-Bzip2
2.020-130.el6_4
perl-IO-Compress-Zlib
2.020-130.el6_4
perl-IO-Zlib
1.09-130.el6_4
perl-IPC-Cmd
0.56-130.el6_4
perl-Locale-Maketext-Simple
0.18-130.el6_4
perl-Log-Message
0.02-130.el6_4
perl-Log-Message-Simple
0.04-130.el6_4
perl-Module-Build
0.3500-130.el6_4
perl-Module-CoreList
2.18-130.el6_4
perl-Module-Load
0.16-130.el6_4
perl-Module-Load-Conditional
0.30-130.el6_4
perl-Module-Loaded
0.02-130.el6_4
perl-Module-Pluggable
3.90-130.el6_4
perl-Object-Accessor
0.34-130.el6_4
perl-Package-Constants
0.02-130.el6_4
perl-Params-Check
0.26-130.el6_4
perl-Parse-CPAN-Meta
1.40-130.el6_4
perl-Pod-Escapes
1.04-130.el6_4
perl-Pod-Simple
3.13-130.el6_4
perl-Term-UI
0.20-130.el6_4
perl-Test-Harness
3.17-130.el6_4
perl-Test-Simple
0.92-130.el6_4
perl-Time-HiRes
1.9721-130.el6_4
perl-Time-Piece
1.15-130.el6_4
perl-core
5.10.1-130.el6_4
perl-devel
5.10.1-130.el6_4
perl-libs
5.10.1-130.el6_4
perl-parent
0.221-130.el6_4
perl-suidperl
5.10.1-130.el6_4
perl-version
0.77-130.el6_4
Oracle Linux 5
Oracle Linux ia64
perl
5.8.8-40.el5_9
perl-suidperl
5.8.8-40.el5_9
Oracle Linux x86_64
perl
5.8.8-40.el5_9
perl-suidperl
5.8.8-40.el5_9
Oracle Linux i386
perl
5.8.8-40.el5_9
perl-suidperl
5.8.8-40.el5_9
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in ...
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.