perl-5.8.8-32.6.0.1.AXS3
エラータID: AXSA:2011-563:02
Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. A large proportion of the CGI scripts on the web are written in Perl. You need the perl package installed on your system so that your system can handle Perl scripts.
Install this package if you want to program in Perl or enable your system to handle Perl scripts.
Security issues fixed with this release:
CVE-2010-2761
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
CVE-2010-4410
CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
CVE-2011-3597
No information available at the time of writing, see the CVE link below.
Update packages.
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
N/A
SRPMS
- perl-5.8.8-32.6.0.1.AXS3.src.rpm
MD5: 30866daa446924b3ac5ddb876a01b1c3
SHA-256: 6d0c9be402f5c89dfc741188c82304256a15079eb681116a152153eebcf5f769
Size: 9.89 MB
Asianux Server 3 for x86
- perl-5.8.8-32.6.0.1.AXS3.i386.rpm
MD5: 973cfcbab39aad3ee02cf1ef0e08a336
SHA-256: 7d4f530ba94261f5502700e7fafb5a17bd1909c6c29c169027e5291846a9325f
Size: 11.61 MB - perl-suidperl-5.8.8-32.6.0.1.AXS3.i386.rpm
MD5: 5898e563b2b107566bce2b769ece1f89
SHA-256: bd7addcd67249d94acfd2eb872cd5ff133293bc334f3ff8829b0dbf820b0ef48
Size: 62.91 kB
Asianux Server 3 for x86_64
- perl-5.8.8-32.6.0.1.AXS3.x86_64.rpm
MD5: c47e77691fb7027a333bedaea26fb8ab
SHA-256: 512aa566690ca356b0a975f87b7b804c04eec7d40c8ff819d9aa47d2edb280fe
Size: 12.24 MB - perl-suidperl-5.8.8-32.6.0.1.AXS3.x86_64.rpm
MD5: 0fa51202cf00067a24585592e13413a9
SHA-256: 799d05e60eafe3672099dbf9d07b9c7024765bebdcaf8568eac801969051d9d2
Size: 63.68 kB