perl-sol10_x64-6.0P1
Obsolete
The latest patch(es) : perl-sol10_x64-6.0P2 

 Basic information
Release type: P-patch
Release date: 2012-10-12
OS update support: None
Technote: None
Documentation: None
Popularity: 940 viewed    downloaded
Download size: 15.02 KB
Checksum: 988559409

 Applies to one or more of the following products:
VirtualStore 6.0 On Solaris 10 X64
Cluster Server 6.0 On Solaris 10 X64
Dynamic Multi-Pathing 6.0 On Solaris 10 X64
Storage Foundation 6.0 On Solaris 10 X64
Storage Foundation Cluster File System 6.0 On Solaris 10 X64
Storage Foundation for Oracle RAC 6.0 On Solaris 10 X64
Storage Foundation HA 6.0 On Solaris 10 X64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch is obsolete. It is superseded by: Release date
perl-sol10_x64-6.0P2 2013-02-26

 Fixes the following incidents:
2941980

 Patch ID:
149689-01

Readme file
                          * * * READ ME * * *
                          * * * Perl 6.0 * * *
                         * * * P-patch 1 * * *
                         Patch Date: 2012-10-12


This document provides the following information:

   * PATCH NAME
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Perl 6.0 P-patch 1


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSperl


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas Cluster Server 6.0
   * Veritas Storage Foundation for Oracle RAC 6.0
   * Veritas Storage Foundation Cluster File System 6.0
   * Veritas Storage Foundation 6.0
   * Veritas Storage Foundation High Availability 6.0
   * Veritas Dynamic Multi-Pathing 6.0
   * Symantec VirtualStore 6.0


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
Solaris 10 X64


INCIDENTS FIXED BY THE PATCH
----------------------------
This patch fixes the following Symantec incidents:

Patch ID: 149689-01

* 2941980 (Tracking ID: 2941980)

SYMPTOM:
iA flaw was reported in perl Digest module's "Digest->new()" function, which did not properly sanitize input before using it in an eval() call, which could possibly be exploited to inject and execute arbitrary perl code.

DESCRIPTION:
Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.

RESOLUTION:
Source change


INSTALLING THE PATCH
--------------------
patchadd 149689-01


REMOVING THE PATCH
------------------
patchrm 149689-01


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE