Package: perl
Version: 5.8.8-11.1
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for perl.

CVE-2007-5116[0]:
| Buffer overflow in the polymorphic opcode support in the Regular
| Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent
| attackers to execute arbitrary code by switching from byte to Unicode
| (UTF) characters in a regular expression.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

This is a serious issue which might lead to code execution. 
This was already fixed in stable security and we are working 
on fixing this in testing-security.

There is a patch for this on:
http://public.activestate.com/cgi-bin/perlbrowse/30647

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpfZYyIYVLIK.pgp
Description: PGP signature

Reply via email to