Summary
The remote host is missing an update to perl
announced via advisory FEDORA-2009-7680.
Solution
Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update perl' at the command line.
For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-7680
Insight
Update Information:
This security update fixes an off-by-one overflow in Compress::Raw::Zlib (CVE-2009-1391) Moreover, it contains a subtle change to the configuration that does not affect the Perl interpreter itself, but fixes the propagation of the chosen options to the modules. For example, a rebuild of perl-Wx against perl-5.10.0-73 will fix bug 508496.
ChangeLog:
* Tue Jul 7 2009 Stepan Kasal - 4:5.10.0-73
- re-enable tests
* Tue Jul 7 2009 Stepan Kasal - 4:5.10.0-72
- move -DPERL_USE_SAFE_PUTENV to ccflags (#508496) * Mon Jun 8 2009 Marcela Maláová - 4:5.10.0-71
- #504386 update of Compress::Raw::Zlib 2.020
* Thu Jun 4 2009 Marcela Maláová - 4:5.10.0-70
- update File::Spec (PathTools) to 3.30
* Wed Jun 3 2009 Stepan Kasal - 4:5.10.0-69
- fix #221113, $! wrongly set when EOF is reached
References
Severity
Classification
-
CVE CVE-2007-4829, CVE-2008-2827, CVE-2009-1391 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities