README VERSION : 1.1 README CREATION DATE : 2013-02-26 PATCH-ID : VRTSperl 5.12.2.10 PATCH NAME : VRTSperl 6.0P2 BASE PACKAGE NAME : VRTSperl BASE PACKAGE VERSION : 5.12.2.6 SUPERSEDED PATCHES : NONE REQUIRED PATCHES : VRTSdbed-6.0.000.200-GA_RHEL.x86_64.rpm INCOMPATIBLE PATCHES : NONE SUPPORTED PADV : rhel5_x86_64 (P-PLATFORM , A-ARCHITECTURE , D-DISTRIBUTION , V-VERSION) PATCH CATEGORY : OTHER PATCH CRITICALITY : OPTIONAL HAS KERNEL COMPONENT : NO ID : NONE REBOOT REQUIRED : NO REQUIRE APPLICATION DOWNTIME : NO PATCH INSTALLATION INSTRUCTIONS: -------------------------------- rpm -Uvh VRTSperl-5.12.2.10-RHEL5.2.x86_64.rpm PATCH UNINSTALLATION INSTRUCTIONS: ---------------------------------- rpm -e VRTSperl SPECIAL INSTALL INSTRUCTIONS: ----------------------------- NONE SUMMARY OF FIXED ISSUES: ----------------------------------------- PATCH ID:VRTSperl 5.12.2.10 3037303 (3037297) Remove module DBD::Oracle and add Log::Log4Perl also fix CVE-2011-3597 Perl Digest improper control of generation of code SUMMARY OF KNOWN ISSUES: ----------------------------------------- KNOWN ISSUES : -------------- FIXED INCIDENTS: ---------------- PATCH ID:VRTSperl 5.12.2.10 * INCIDENT NO:3037303 TRACKING ID:3037297 SYMPTOM: Perl Digest improper control of generation of code DESCRIPTION: Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor. RESOLUTION: Source change. INCIDENTS FROM OLD PATCHES: --------------------------- NONE