Perl is a high-level programming language commonly used for systemadministration utilities and web programming. The Perl CGI module providesresources for preparing and processing Common Gateway Interface (CGI) basedHTTP requests and responses.It was found that the Perl CGI module used a hard-coded value for the MIMEboundary string in multipart/x-mixed-replace content. A remote attackercould possibly use this flaw to conduct an HTTP response splitting attackvia a specially-crafted HTTP request. (CVE-2010-2761)A CRLF injection flaw was found in the way the Perl CGI module processed asequence of non-whitespace preceded by newline characters in the header. Aremote attacker could use this flaw to conduct an HTTP response splittingattack via a specially-crafted sequence of characters provided to the CGImodule. (CVE-2010-4410)It was found that certain Perl string manipulation functions (such as uc()and lc()) failed to preserve the taint bit. A remote attacker could usethis flaw to bypass the Perl taint mode protection mechanism in scriptsthat use the affected functions to process tainted input. (CVE-2011-1487)These packages upgrade the CGI module to version 3.51. Refer to the CGImodule's Changes file, linked to in the References, for a full list ofchanges.This update also fixes the following bugs:CPAN: checksum security checks disabled because Digest::SHA not installed.Please consider installing the Digest::SHA module.This update corrects the spec file for the perl package to require theperl-Digest-SHA package as a dependency, and cpan no longer displays theabove message. (BZ#640716)Users of Perl, especially those of Perl threads, are advised to upgrade tothese updated packages, which correct these issues.