This page lists publically-released patches for Veritas Enterprise Products.
For Product GA build, see Veritas Entitlement Management System(VEMS) by clicking the Veritas Support 'Licensing' option.
For information on private patches, contact Veritas Technical Support.
For NetBackup Enterprise Server and NetBackup Server patches, see the NetBackup Downloads.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
perl-sol_sparc-5.1P1
Sign in if you want to rate this patch.

 Basic information
Release type: P-patch
Release date: 2012-10-12
OS update support: None
Technote: None
Documentation: None
Popularity: 952 viewed    273 downloaded
Download size: 14.73 KB
Checksum: 2710792785

 Applies to one or more of the following products:
Authentication Service 5.1 On Solaris 10 SPARC
Authentication Service 5.1SP1 On Solaris 10 SPARC
Authentication Service 5.1 On Solaris 9 SPARC
Authentication Service 5.1SP1 On Solaris 9 SPARC
Cluster Server 5.1 On Solaris 10 SPARC
Cluster Server 5.1SP1 On Solaris 10 SPARC
Cluster Server 5.1 On Solaris 9 SPARC
Cluster Server 5.1SP1 On Solaris 9 SPARC
Storage Foundation 5.1 On Solaris 10 SPARC
Storage Foundation 5.1SP1 On Solaris 10 SPARC
Storage Foundation 5.1 On Solaris 9 SPARC
Storage Foundation 5.1SP1 On Solaris 9 SPARC
Storage Foundation Cluster File System 5.1 On Solaris 10 SPARC
Storage Foundation Cluster File System 5.1SP1 On Solaris 10 SPARC
Storage Foundation Cluster File System 5.1 On Solaris 9 SPARC
Storage Foundation Cluster File System 5.1SP1 On Solaris 9 SPARC
Storage Foundation for Oracle RAC 5.1 On Solaris 10 SPARC
Storage Foundation for Oracle RAC 5.1SP1 On Solaris 10 SPARC
Storage Foundation for Oracle RAC 5.1 On Solaris 9 SPARC
Storage Foundation for Oracle RAC 5.1SP1 On Solaris 9 SPARC
Storage Foundation HA 5.1 On Solaris 10 SPARC
Storage Foundation HA 5.1SP1 On Solaris 10 SPARC
Storage Foundation HA 5.1 On Solaris 9 SPARC
Storage Foundation HA 5.1SP1 On Solaris 9 SPARC

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
2941980

 Patch ID:
149700-01

 Readme file  [Save As...]
                          * * * READ ME * * *
                          * * * Perl 5.1 * * *
                         * * * P-patch 1 * * *
                         Patch Date: 2012-10-12


This document provides the following information:

   * PATCH NAME
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Perl 5.1 P-patch 1


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSperl


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas Cluster Server 5.1
   * Veritas Cluster Server 5.1 SP1
   * Veritas Storage Foundation for Oracle RAC 5.1
   * Veritas Storage Foundation for Oracle RAC 5.1 SP1
   * Veritas Storage Foundation Cluster File System 5.1
   * Veritas Storage Foundation Cluster File System 5.1 SP1
   * Veritas Storage Foundation 5.1
   * Veritas Storage Foundation 5.1 SP1
   * Veritas Storage Foundation High Availability 5.1
   * Veritas Storage Foundation High Availability 5.1 SP1
   * Veritas Authentication Service 5.1
   * Veritas Authentication Service 5.1 SP1


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
Solaris 9 SPARC
Solaris 10 SPARC


INCIDENTS FIXED BY THE PATCH
----------------------------
This patch fixes the following Symantec incidents:

Patch ID: 149700-01

* 2941980 (Tracking ID: 2941980)

SYMPTOM:
iA flaw was reported in perl Digest module's "Digest->new()" function, which did not properly sanitize input before using it in an eval() call, which could possibly be exploited to inject and execute arbitrary perl code.

DESCRIPTION:
Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.

RESOLUTION:
Source change


INSTALLING THE PATCH
--------------------
patchadd 149700-01


REMOVING THE PATCH
------------------
patchrm 149700-01


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE



Read and accept Terms of Service