Skip to navigation

Bug Fix Advisory perl bug fix update

Advisory: RHBA-2011:0863-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-06-09
Last updated on: 2011-06-09
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

Updated perl packages that fix two bugs are now available for Red Hat Enterprise
Linux 5.

Perl is a high-level programming language commonly used for system
administration utilities and web programming.

This update fixes the following bug:

* Prior to this update, running the CGI::popup_menu method with a default menu
choice (that is, the "-default" parameter) that contained a plus sign failed to
produce correct HTML output. This update applies a patch that corrects the
underlying option parser, and the presence of the plus sign in the name of the
default menu choice no longer prevents CGI::popup_menu from producing correct
output. (BZ#701631)

* Due to an error in the "threads" module, memory was leaked each time a thread
was detached. Over time, this may have caused long-running threaded Perl
programs to consume a significant amount of memory. With this update, a patch
has been applied to ensure the allocated memory is properly freed when a thread
is detached, and using threads in Perl applications no longer leads to memory
leaks. (BZ#701632)

Users of CGI and threads in Perl programs are advised to upgrade to these
updated packages, which resolve these issues.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
perl-5.8.8-32.el5_6.3.src.rpm
File outdated by:  RHBA-2013:1296
    MD5: 71e81456025a4b20ee1703ddba91bd41
SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7
 
IA-32:
perl-5.8.8-32.el5_6.3.i386.rpm
File outdated by:  RHBA-2013:1296
    MD5: 61b04e8d2f30e10dc7075ca5267d78a6
SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm
File outdated by:  RHBA-2013:1296
    MD5: 0820c1bb30cf5212ff478016cbe9f4ac
SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4
 
IA-64:
perl-5.8.8-32.el5_6.3.ia64.rpm
File outdated by:  RHBA-2013:1296
    MD5: c8d3c504fa2ab079d743704d0b83462f
SHA-256: 829d7a4119b75a331a1a10e9b7bcec1e958cb7ea0d54e8c2aea74af105452eb4
perl-suidperl-5.8.8-32.el5_6.3.ia64.rpm
File outdated by:  RHBA-2013:1296
    MD5: 8dd8d66d6a97c8f5f3ad8446e4bbe2dd
SHA-256: 3caaf86f8069e0b4cf72c9b8f1d0ab219766d5413da05cad0127b87232daae67
 
PPC:
perl-5.8.8-32.el5_6.3.ppc.rpm
File outdated by:  RHBA-2013:1296
    MD5: 0db3c38a18c66695efa9aff12275b3d1
SHA-256: b90b2cd4b018ddae69f753bcb502f600aac77805f718db22b483f3397e185df7
perl-suidperl-5.8.8-32.el5_6.3.ppc.rpm
File outdated by:  RHBA-2013:1296
    MD5: 45db23e76818550b24fcf9fe18253f62
SHA-256: d833b3ff357cd7465a4e2c12163b997ae8fb8bbb99fa1ee31fa4dd9fc03a150a
 
s390x:
perl-5.8.8-32.el5_6.3.s390x.rpm
File outdated by:  RHBA-2013:1296
    MD5: a69c65bc5fe9a7012c9287702899e5c9
SHA-256: 710c94cd472d845ad344518dd6a17ac6e03acd19856a6518ccfcb1b69018b3ca
perl-suidperl-5.8.8-32.el5_6.3.s390x.rpm
File outdated by:  RHBA-2013:1296
    MD5: d94ff71d5b86f394589bae6cd46bb81c
SHA-256: bc364e4438e8cd5a08fbedddb2497254280a44c9f0be0febd0b0afa934f28c6d
 
x86_64:
perl-5.8.8-32.el5_6.3.x86_64.rpm
File outdated by:  RHBA-2013:1296
    MD5: 39ac36f88d3a52eda95020503d202b72
SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm
File outdated by:  RHBA-2013:1296
    MD5: dbdb56550848aae2020ce4caabf2a239
SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
perl-5.8.8-32.el5_6.3.src.rpm
File outdated by:  RHBA-2013:1296
    MD5: 71e81456025a4b20ee1703ddba91bd41
SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7
 
IA-32:
perl-5.8.8-32.el5_6.3.i386.rpm
File outdated by:  RHBA-2013:1296
    MD5: 61b04e8d2f30e10dc7075ca5267d78a6
SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm
File outdated by:  RHBA-2013:1296
    MD5: 0820c1bb30cf5212ff478016cbe9f4ac
SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4
 
x86_64:
perl-5.8.8-32.el5_6.3.i386.rpm
File outdated by:  RHBA-2013:1296
    MD5: 61b04e8d2f30e10dc7075ca5267d78a6
SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17
perl-5.8.8-32.el5_6.3.x86_64.rpm
File outdated by:  RHBA-2013:1296
    MD5: 39ac36f88d3a52eda95020503d202b72
SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm
File outdated by:  RHBA-2013:1296
    MD5: dbdb56550848aae2020ce4caabf2a239
SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
perl-5.8.8-32.el5_6.3.src.rpm
File outdated by:  RHBA-2013:1296
    MD5: 71e81456025a4b20ee1703ddba91bd41
SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7
 
IA-32:
perl-5.8.8-32.el5_6.3.i386.rpm     MD5: 61b04e8d2f30e10dc7075ca5267d78a6
SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm     MD5: 0820c1bb30cf5212ff478016cbe9f4ac
SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4
 
IA-64:
perl-5.8.8-32.el5_6.3.ia64.rpm     MD5: c8d3c504fa2ab079d743704d0b83462f
SHA-256: 829d7a4119b75a331a1a10e9b7bcec1e958cb7ea0d54e8c2aea74af105452eb4
perl-suidperl-5.8.8-32.el5_6.3.ia64.rpm     MD5: 8dd8d66d6a97c8f5f3ad8446e4bbe2dd
SHA-256: 3caaf86f8069e0b4cf72c9b8f1d0ab219766d5413da05cad0127b87232daae67
 
PPC:
perl-5.8.8-32.el5_6.3.ppc.rpm     MD5: 0db3c38a18c66695efa9aff12275b3d1
SHA-256: b90b2cd4b018ddae69f753bcb502f600aac77805f718db22b483f3397e185df7
perl-suidperl-5.8.8-32.el5_6.3.ppc.rpm     MD5: 45db23e76818550b24fcf9fe18253f62
SHA-256: d833b3ff357cd7465a4e2c12163b997ae8fb8bbb99fa1ee31fa4dd9fc03a150a
 
s390x:
perl-5.8.8-32.el5_6.3.s390x.rpm     MD5: a69c65bc5fe9a7012c9287702899e5c9
SHA-256: 710c94cd472d845ad344518dd6a17ac6e03acd19856a6518ccfcb1b69018b3ca
perl-suidperl-5.8.8-32.el5_6.3.s390x.rpm     MD5: d94ff71d5b86f394589bae6cd46bb81c
SHA-256: bc364e4438e8cd5a08fbedddb2497254280a44c9f0be0febd0b0afa934f28c6d
 
x86_64:
perl-5.8.8-32.el5_6.3.x86_64.rpm     MD5: 39ac36f88d3a52eda95020503d202b72
SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm     MD5: dbdb56550848aae2020ce4caabf2a239
SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
perl-5.8.8-32.el5_6.3.src.rpm
File outdated by:  RHBA-2013:1296
    MD5: 71e81456025a4b20ee1703ddba91bd41
SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7
 
IA-32:
perl-5.8.8-32.el5_6.3.i386.rpm     MD5: 61b04e8d2f30e10dc7075ca5267d78a6
SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm     MD5: 0820c1bb30cf5212ff478016cbe9f4ac
SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4
 
IA-64:
perl-5.8.8-32.el5_6.3.ia64.rpm     MD5: c8d3c504fa2ab079d743704d0b83462f
SHA-256: 829d7a4119b75a331a1a10e9b7bcec1e958cb7ea0d54e8c2aea74af105452eb4
perl-suidperl-5.8.8-32.el5_6.3.ia64.rpm     MD5: 8dd8d66d6a97c8f5f3ad8446e4bbe2dd
SHA-256: 3caaf86f8069e0b4cf72c9b8f1d0ab219766d5413da05cad0127b87232daae67
 
x86_64:
perl-5.8.8-32.el5_6.3.x86_64.rpm     MD5: 39ac36f88d3a52eda95020503d202b72
SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm     MD5: dbdb56550848aae2020ce4caabf2a239
SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

701631 - CGI.pm popup_menu if optgroup, $selected is not properly escaped.
701632 - Perl threads leak memory when detached


Keywords

CGI, leak,, memory, threads,


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/