CVE-2008-1927 (retired)

Priority
Description
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers
to cause a denial of service (memory corruption and crash) via a crafted
regular expression containing UTF8 characters. NOTE: this issue might only
be present on certain operating systems.
Notes
 jdstrand> perl (at least 5.8 and 5.10) segfault on x86_64
 jdstrand> verified all releases -- i386 not affected, x86_64 is affected
Assigned-to
kees
Package
Source: perl (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Vendor:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
More Information

Updated: 2019-03-26 11:43:51 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)