- Issued:
- 2011-06-09
- Updated:
- 2011-06-09
RHBA-2011:0863 - Bug Fix Advisory
Synopsis
perl bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated perl packages that fix two bugs are now available for Red Hat Enterprise
Linux 5.
Description
Perl is a high-level programming language commonly used for system
administration utilities and web programming.
This update fixes the following bug:
- Prior to this update, running the CGI::popup_menu method with a default menu
choice (that is, the "-default" parameter) that contained a plus sign failed to
produce correct HTML output. This update applies a patch that corrects the
underlying option parser, and the presence of the plus sign in the name of the
default menu choice no longer prevents CGI::popup_menu from producing correct
output. (BZ#701631)
- Due to an error in the "threads" module, memory was leaked each time a thread
was detached. Over time, this may have caused long-running threaded Perl
programs to consume a significant amount of memory. With this update, a patch
has been applied to ensure the allocated memory is properly freed when a thread
is detached, and using threads in Perl applications no longer leads to memory
leaks. (BZ#701632)
Users of CGI and threads in Perl programs are advised to upgrade to these
updated packages, which resolve these issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 ia64
- Red Hat Enterprise Linux Server - AUS 5.6 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
Fixes
- BZ - 701631 - CGI.pm popup_menu if optgroup, $selected is not properly escaped.
- BZ - 701632 - Perl threads leak memory when detached
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
x86_64 | |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
ia64 | |
perl-5.8.8-32.el5_6.3.ia64.rpm | SHA-256: 829d7a4119b75a331a1a10e9b7bcec1e958cb7ea0d54e8c2aea74af105452eb4 |
perl-suidperl-5.8.8-32.el5_6.3.ia64.rpm | SHA-256: 3caaf86f8069e0b4cf72c9b8f1d0ab219766d5413da05cad0127b87232daae67 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
x86_64 | |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
ia64 | |
perl-5.8.8-32.el5_6.3.ia64.rpm | SHA-256: 829d7a4119b75a331a1a10e9b7bcec1e958cb7ea0d54e8c2aea74af105452eb4 |
perl-suidperl-5.8.8-32.el5_6.3.ia64.rpm | SHA-256: 3caaf86f8069e0b4cf72c9b8f1d0ab219766d5413da05cad0127b87232daae67 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux Server - AUS 5.6
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
ia64 | |
perl-5.8.8-32.el5_6.3.ia64.rpm | SHA-256: 829d7a4119b75a331a1a10e9b7bcec1e958cb7ea0d54e8c2aea74af105452eb4 |
perl-suidperl-5.8.8-32.el5_6.3.ia64.rpm | SHA-256: 3caaf86f8069e0b4cf72c9b8f1d0ab219766d5413da05cad0127b87232daae67 |
x86_64 | |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
x86_64 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
x86_64 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
s390x | |
perl-5.8.8-32.el5_6.3.s390x.rpm | SHA-256: 710c94cd472d845ad344518dd6a17ac6e03acd19856a6518ccfcb1b69018b3ca |
perl-suidperl-5.8.8-32.el5_6.3.s390x.rpm | SHA-256: bc364e4438e8cd5a08fbedddb2497254280a44c9f0be0febd0b0afa934f28c6d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
ppc | |
perl-5.8.8-32.el5_6.3.ppc.rpm | SHA-256: b90b2cd4b018ddae69f753bcb502f600aac77805f718db22b483f3397e185df7 |
perl-suidperl-5.8.8-32.el5_6.3.ppc.rpm | SHA-256: d833b3ff357cd7465a4e2c12163b997ae8fb8bbb99fa1ee31fa4dd9fc03a150a |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
ppc | |
perl-5.8.8-32.el5_6.3.ppc.rpm | SHA-256: b90b2cd4b018ddae69f753bcb502f600aac77805f718db22b483f3397e185df7 |
perl-suidperl-5.8.8-32.el5_6.3.ppc.rpm | SHA-256: d833b3ff357cd7465a4e2c12163b997ae8fb8bbb99fa1ee31fa4dd9fc03a150a |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
x86_64 | |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
x86_64 | |
perl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 4bd5e97bf5827d1c745003ae7f5fc3311bbbd48085b6febd7a3f7a909ce937de |
perl-suidperl-5.8.8-32.el5_6.3.x86_64.rpm | SHA-256: 0f6437f93ebf93fde1e1a48fe0355e6fafde15ae851d88683d59070ca0c09150 |
i386 | |
perl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 2bf336615ba91a09d35c208954327a832685bb09fb492605a5e2ff2889a0ae17 |
perl-suidperl-5.8.8-32.el5_6.3.i386.rpm | SHA-256: 0231a460f807dc3ca615c00c84e04bdaf985d942a299041d80607880e49ddbd4 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
perl-5.8.8-32.el5_6.3.src.rpm | SHA-256: 4d292313a96d555f9d05de52399248c64d240ca00a752f4c68c11a784563d9e7 |
s390x | |
perl-5.8.8-32.el5_6.3.s390x.rpm | SHA-256: 710c94cd472d845ad344518dd6a17ac6e03acd19856a6518ccfcb1b69018b3ca |
perl-suidperl-5.8.8-32.el5_6.3.s390x.rpm | SHA-256: bc364e4438e8cd5a08fbedddb2497254280a44c9f0be0febd0b0afa934f28c6d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.