Perl: Execution of arbitrary code — GLSA 200805-17

A double free vulnerability was discovered in Perl, possibly resulting in the execution of arbitrary code and a Denial of Service.

Affected packages

dev-lang/perl on all architectures
Affected versions < 5.8.8-r5
Unaffected versions >= 5.8.8-r5
sys-devel/libperl on all architectures
Affected versions < 5.8.8-r2
Unaffected versions >= 5.8.8-r2

Background

Perl is a stable, cross platform programming language.

Description

Tavis Ormandy and Will Drewry of the Google Security Team have reported a double free vulnerability when processing a crafted regular expression containing UTF-8 characters.

Impact

A remote attacker could possibly exploit this vulnerability to execute arbitrary code or cause a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All Perl users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.8.8-r5"

All libperl users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-devel/libperl-5.8.8-r2"

References

Release date
May 20, 2008

Latest revision
May 20, 2008: 01

Severity
normal

Exploitable
remote

Bugzilla entries