* * * READ ME * * * * * * Perl 6.1.1 * * * * * * Patch 6.1.1.100 * * * Patch Date: 2015-01-26 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Perl 6.1.1 Patch 6.1.1.100 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- SLES11 x86-64 PACKAGES AFFECTED BY THE PATCH ------------------------------ VRTSperl BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Symantec Application HA 6.1 * Symantec Cluster Server 6.1 * Symantec Dynamic Multi-Pathing 6.1 * Symantec File System 6.1 * Symantec Storage Foundation 6.1 * Symantec Storage Foundation Cluster File System HA 6.1 * Symantec Storage Foundation for Oracle RAC 6.1 * Symantec Storage Foundation HA 6.1 * Symantec Volume Manager 6.1 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: 5.16.1.7 * 3712831 (3712829) OpenSSL common vulnerability exposure (CVE): POODLE and Heartbleed. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following Symantec incidents: Patch ID: 5.16.1.7 * 3712831 (Tracking ID: 3712829) SYMPTOM: OpenSSL common vulnerability exposure (CVE): POODLE and Heartbleed. DESCRIPTION: VRTSperl package uses old versions of OpenSSL which are vulnerable to POODLE(CVE-2014-3566) and Hearbleed(CVE-2014-0160). By upgrading to OpenSSL 0.9.8zc/1.0.1j, many security vulnerabilities have been fixed. RESOLUTION: The VRTSperl package is built with OpenSSL 0.9.8zc/1.0.1j for 6.0.x/6.1. INSTALLING THE PATCH -------------------- rpm -Uvh VRTSperl-5.16.1.7-SLES11.x86_64.rpm REMOVING THE PATCH ------------------ NONE SPECIAL INSTRUCTIONS -------------------- NONE OTHERS ------ NONE