Package: perl Version: 5.8.8-11.1 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for perl.
CVE-2007-5116[0]: | Buffer overflow in the polymorphic opcode support in the Regular | Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent | attackers to execute arbitrary code by switching from byte to Unicode | (UTF) characters in a regular expression. If you fix this vulnerability please also include the CVE id in your changelog entry. This is a serious issue which might lead to code execution. This was already fixed in stable security and we are working on fixing this in testing-security. There is a patch for this on: http://public.activestate.com/cgi-bin/perlbrowse/30647 For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpfZYyIYVLIK.pgp
Description: PGP signature