perl-5.8.8-40.0.1.AXS3
エラータID: AXSA:2013-340:01
Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. A large proportion of the CGI scripts on the web are written in Perl. You need the perl package installed on your system so that your system can handle Perl scripts.
Install this package if you want to program in Perl or enable your system to handle Perl scripts.
Security issues fixed with this release:
• CVE-2012-5195
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
• CVE-2012-5526
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
• CVE-2012-6329
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
• CVE-2013-1667
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
Update packages.
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
N/A
SRPMS
- perl-5.8.8-40.0.1.AXS3.src.rpm
MD5: 44c6e9267085bb454752e300de6b97d5
SHA-256: 27b9021b1b9c67f56c4ae5c0fd274c07d2a7708af6a8adeda4e3aa6a2a42f9a0
Size: 10.25 MB
Asianux Server 3 for x86
- perl-5.8.8-40.0.1.AXS3.i386.rpm
MD5: 5edabe194ea6603e60ae80b5d7ebc50e
SHA-256: 365fde64eaff2c1f747f4b888bded77e4f5e39fdbacb9eb6c4a1c31e38c6a046
Size: 11.79 MB - perl-suidperl-5.8.8-40.0.1.AXS3.i386.rpm
MD5: 45a435b92e8efd1eace7962b70c02d91
SHA-256: 57cfa1676cdadff48e405b0748b6b765739ecf5738f876bbc8389eb57ed53eff
Size: 64.43 kB
Asianux Server 3 for x86_64
- perl-5.8.8-40.0.1.AXS3.x86_64.rpm
MD5: c163f9dc5cd058f155f7e686e52ebb7c
SHA-256: 40dea708d0f68ddb1315133781b5c1651b52daaab2b986de04187ca80d24b8b5
Size: 12.42 MB - perl-suidperl-5.8.8-40.0.1.AXS3.x86_64.rpm
MD5: 0fea4c04320161ca7dac3cd4b9d76d78
SHA-256: bf64b329bfad4ac90c9d9f8fe709c1080f55d355df30734b2434dbe311c27cce
Size: 65.19 kB