* * * READ ME * * * * * * Perl 6.0 * * * * * * P-patch 1 * * * Patch Date: 2012-10-12 This document provides the following information: * PATCH NAME * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * OPERATING SYSTEMS SUPPORTED BY THE PATCH * INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Perl 6.0 P-patch 1 PACKAGES AFFECTED BY THE PATCH ------------------------------ VRTSperl BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Veritas Cluster Server 6.0 * Veritas Storage Foundation for Oracle RAC 6.0 * Veritas Storage Foundation Cluster File System 6.0 * Veritas Storage Foundation 6.0 * Veritas Storage Foundation High Availability 6.0 * Veritas Dynamic Multi-Pathing 6.0 * Symantec VirtualStore 6.0 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- Solaris 10 X64 INCIDENTS FIXED BY THE PATCH ---------------------------- This patch fixes the following Symantec incidents: Patch ID: 149689-01 * 2941980 (Tracking ID: 2941980) SYMPTOM: iA flaw was reported in perl Digest module's "Digest->new()" function, which did not properly sanitize input before using it in an eval() call, which could possibly be exploited to inject and execute arbitrary perl code. DESCRIPTION: Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor. RESOLUTION: Source change INSTALLING THE PATCH -------------------- patchadd 149689-01 REMOVING THE PATCH ------------------ patchrm 149689-01 SPECIAL INSTRUCTIONS -------------------- NONE OTHERS ------ NONE