CVE-2008-1927

Priority
Description
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers
to cause a denial of service (memory corruption and crash) via a crafted
regular expression containing UTF8 characters. NOTE: this issue might only
be present on certain operating systems.
Assigned-to
kees
Notes
jdstrandperl (at least 5.8 and 5.10) segfault on x86_64
verified all releases -- i386 not affected, x86_64 is affected
Package
Source: perl (LP Ubuntu Debian)
Upstream:needs-triage
Patches:
Vendor:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
More Information

Updated: 2019-12-05 20:48:56 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)