RHSA-2005:880 perl security update to fix integer overflow bu
Reporter | Title | Published | Views | Family All 56 |
---|---|---|---|---|
![]() | remote denial of service in perl | 20 Dec 200515:04 | – | suse |
![]() | Ubuntu 4.10 / 5.04 / 5.10 : perl vulnerability (USN-222-1) | 21 Jan 200600:00 | – | nessus |
![]() | Ubuntu 4.10 / 5.04 / 5.10 : perl vulnerability (USN-222-2) | 21 Jan 200600:00 | – | nessus |
![]() | Solaris 10 (x86) : 122082-01 | 6 Mar 200600:00 | – | nessus |
![]() | Debian DSA-943-1 : perl - integer overflow | 14 Oct 200600:00 | – | nessus |
![]() | SUSE-SA:2005:071: perl | 30 Dec 200500:00 | – | nessus |
![]() | GLSA-200512-01 : Perl: Format string errors can lead to code execution | 8 Dec 200500:00 | – | nessus |
![]() | CentOS 4 : perl (CESA-2005:880) | 5 Jul 200600:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : perl (MDKSA-2005:225) | 15 Jan 200600:00 | – | nessus |
![]() | Solaris 10 (x86) : 122082-01 | 12 Mar 201800:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | ppc | perl-suidperl | 5.8.5-24.RHEL4 | perl-suidperl-5.8.5-24.RHEL4.ppc.rpm |
RedHat | any | ia64 | perl | 5.8.5-24.RHEL4 | perl-5.8.5-24.RHEL4.ia64.rpm |
RedHat | any | s390x | perl-suidperl | 5.8.5-24.RHEL4 | perl-suidperl-5.8.5-24.RHEL4.s390x.rpm |
RedHat | any | ppc | perl | 5.8.5-24.RHEL4 | perl-5.8.5-24.RHEL4.ppc.rpm |
RedHat | any | x86_64 | perl-suidperl | 5.8.5-24.RHEL4 | perl-suidperl-5.8.5-24.RHEL4.x86_64.rpm |
RedHat | any | s390 | perl-suidperl | 5.8.5-24.RHEL4 | perl-suidperl-5.8.5-24.RHEL4.s390.rpm |
RedHat | any | s390 | perl | 5.8.5-24.RHEL4 | perl-5.8.5-24.RHEL4.s390.rpm |
RedHat | any | i386 | perl | 5.8.5-24.RHEL4 | perl-5.8.5-24.RHEL4.i386.rpm |
RedHat | any | s390x | perl | 5.8.5-24.RHEL4 | perl-5.8.5-24.RHEL4.s390x.rpm |
RedHat | any | src | perl | 5.8.5-24.RHEL4 | perl-5.8.5-24.RHEL4.src.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo