Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2011-0761

Published: 13 May 2011

Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.

Notes

AuthorNote
sbeattie
toucan systems advisory has PoC
seth-arnold
ignoring this CVE: flaw requires extremely poorly written software
to exploit the problem (allow input to modify the number of arguments
to fundamental functions), crashes do not appear to be under argument
control. Upstream Perl team does not consider it a security-relevant
problem and thus have not prepared any patches.

Priority

Low

Status

Package Release Status
perl
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
hardy Ignored

lucid Ignored

maverick Ignored
(end of life)
natty Ignored
(end of life)
oneiric Not vulnerable
(5.12.4-4)
precise Not vulnerable
(5.12.4-4)
quantal Not vulnerable
(5.12.4-4)
upstream
Released (5.12.4-4)