CVE-2008-1927
Published: 24 April 2008
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
Notes
Author | Note |
---|---|
jdstrand | perl (at least 5.8 and 5.10) segfault on x86_64 verified all releases -- i386 not affected, x86_64 is affected |
Priority
Status
Package | Release | Status |
---|---|---|
perl Launchpad, Ubuntu, Debian |
dapper |
Released
(5.8.7-10ubuntu1.2)
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Released
(5.8.8-7ubuntu3.4)
|
|
hardy |
Released
(5.8.8-12ubuntu0.3)
|
|
intrepid |
Not vulnerable
|
|
upstream |
Needs triage
|
|
Patches: vendor: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792 |