1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-25 09:34:11 +00:00

- Document perl -- regular expressions unicode data buffer overflow

Reviewed by:	simon/tobez
Approved by:	portmgr (blanket) (ports-security blanket)
This commit is contained in:
Martin Wilke 2007-11-06 22:19:49 +00:00
parent bbc34ddf11
commit f1751568f5
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=202551

View File

@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="5b47c279-8cb5-11dc-8878-0016179b2dd5">
<topic>perl -- regular expressions unicode data buffer overflow</topic>
<affects>
<package>
<name>perl</name>
<range><gt>5.8.*</gt><lt>5.8.8_1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Red Hat reports:</p>
<blockquote cite="https://rhn.redhat.com/errata/RHSA-2007-0966.html">
<p>A flaw was found in Perl's regular expression engine. Specially crafted
input to a regular expression can cause Perl to improperly allocate
memory, possibly resulting in arbitrary code running with the permissions
of the user running Perl.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2007-5116</cvename>
<url>http://secunia.com/advisories/27546/</url>
</references>
<dates>
<discovery>2007-11-05</discovery>
<entry>2007-11-06</entry>
</dates>
</vuln>
<vuln vid="bfd6eef4-8c94-11dc-8c55-001c2514716c">
<topic>pcre -- arbitrary code execution</topic>
<affects>