Fedora 7 : perl-5.8.8-29.fc7 (2008-3399)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

- Tue Apr 29 2008 Marcela Maslanova <mmaslano at
redhat.com> - 4:5.8.8-29

- CVE-2008-1927 buffer overflow, when unicode character
is used.

- Thu Jan 31 2008 Tom 'spot' Callaway <tcallawa at
redhat.com> - 4:5.8.8-28

- create /usr/lib/perl5/vendor_perl/5.8.8/auto and own
it in base perl (resolves bugzilla 214580)

- Mon Nov 26 2007 Tom 'spot' Callaway <tcallawa at
redhat.com> - 4:5.8.8-27

- break dep loop, fix bugzilla 397881

- Mon Nov 12 2007 Tom 'spot' Callaway <tcallawa at
redhat.com> - 4:5.8.8-26

- fix for CVE-2007-5116

- Thu Oct 25 2007 Tom 'spot' Callaway <tcallawa at
redhat.com> - 4:5.8.8-25

- patch from perl bug 24254, fix for RH bz 114271

- Mon Oct 1 2007 Tom 'spot' Callaway <tcallawa at
redhat.com> - 4:5.8.8-24

- update DB_File to 1.815

- Sat Aug 18 2007 Stepan Kasal <skasal at redhat.com> -
4:5.8.8-23

- Remove unnnecessary parens from the License tags.

- Sat Aug 18 2007 Stepan Kasal <skasal at redhat.com> -
4:5.8.8-22

- Fix the License: tags.

- Fri Aug 17 2007 Stepan Kasal <skasal at redhat.com> -
4:5.8.8-21

- Apply patch to skip hostname tests, since hostname
lookup isn't available in Fedora buildroots by design.

- Fri Aug 17 2007 Stepan Kasal <skasal at redhat.com> -
4:5.8.8-20

- perl rpm requires the corresponding version of
perl-libs rpm

- Resolves: rhbz#240540

- Fri Jun 22 2007 Robin Norwood <rnorwood at redhat.com>
- 4:5.8.8-19

- Resolves: rhbz#196836

- Apply upstream patch #28775, which fixes an issue
where reblessing overloaded objects incurs significant
performance penalty

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=443928
http://www.nessus.org/u?2cb594bb

Solution :

Update the affected perl package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Fedora Local Security Checks

Nessus Plugin ID: 32105 (fedora_2008-3399.nasl)

Bugtraq ID: 28928

CVE ID: CVE-2008-1927

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now