A double free vulnerability was discovered in Perl, possibly resulting in the execution of arbitrary code and a Denial of Service.
Package | dev-lang/perl on all architectures |
---|---|
Affected versions | < 5.8.8-r5 |
Unaffected versions | >= 5.8.8-r5 |
Package | sys-devel/libperl on all architectures |
---|---|
Affected versions | < 5.8.8-r2 |
Unaffected versions | >= 5.8.8-r2 |
Perl is a stable, cross platform programming language.
Tavis Ormandy and Will Drewry of the Google Security Team have reported a double free vulnerability when processing a crafted regular expression containing UTF-8 characters.
A remote attacker could possibly exploit this vulnerability to execute arbitrary code or cause a Denial of Service.
There is no known workaround at this time.
All Perl users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.8.8-r5"
All libperl users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-devel/libperl-5.8.8-r2"
Release date
May 20, 2008
Latest revision
May 20, 2008: 01
Severity
normal
Exploitable
remote
Bugzilla entries