summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2007-11-06 22:19:49 +0000
committerMartin Wilke <miwi@FreeBSD.org>2007-11-06 22:19:49 +0000
commitf1751568f5cb2a02c3f880a51114dbe1803859a5 (patch)
treebc1cf35f106f5c59abd82561467ec2c201e1564d /security
parentFix a possible buffer overflow with ASCII regexes that really are (diff)
- Document perl -- regular expressions unicode data buffer overflow
Reviewed by: simon/tobez Approved by: portmgr (blanket) (ports-security blanket)
Notes
Notes: svn path=/head/; revision=202551
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 6de6f2cb2b21..53222687f1e1 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="5b47c279-8cb5-11dc-8878-0016179b2dd5">
+ <topic>perl -- regular expressions unicode data buffer overflow</topic>
+ <affects>
+ <package>
+ <name>perl</name>
+ <range><gt>5.8.*</gt><lt>5.8.8_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Red Hat reports:</p>
+ <blockquote cite="https://rhn.redhat.com/errata/RHSA-2007-0966.html">
+ <p>A flaw was found in Perl's regular expression engine. Specially crafted
+ input to a regular expression can cause Perl to improperly allocate
+ memory, possibly resulting in arbitrary code running with the permissions
+ of the user running Perl.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-5116</cvename>
+ <url>http://secunia.com/advisories/27546/</url>
+ </references>
+ <dates>
+ <discovery>2007-11-05</discovery>
+ <entry>2007-11-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="bfd6eef4-8c94-11dc-8c55-001c2514716c">
<topic>pcre -- arbitrary code execution</topic>
<affects>