Resource Management Errors Affecting perl package, versions <5.10.0-1
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.99% (84th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-PERL-327797
- published 24 Apr 2008
- disclosed 24 Apr 2008
Introduced: 24 Apr 2008
CVE-2008-1927 Open this link in a new tabHow to fix?
Upgrade Debian:10
perl
to version 5.10.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
References
- https://security-tracker.debian.org/tracker/CVE-2008-1927
- http://support.apple.com/kb/HT3438
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://www.securityfocus.com/archive/1/500210/100/0/threaded
- http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
- http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
- http://wiki.rpath.com/Advisories:rPSA-2009-0011
- http://www.ipcop.org/index.php?name=News&file=article&sid=41
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
- http://www.debian.org/security/2008/dsa-1556
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
- http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
- http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
- http://osvdb.org/44588
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
- http://secunia.com/advisories/29948
- http://secunia.com/advisories/30025
- http://secunia.com/advisories/30326
- http://secunia.com/advisories/30624
- http://secunia.com/advisories/31208
- http://secunia.com/advisories/31328
- http://secunia.com/advisories/31467
- http://secunia.com/advisories/31604
- http://secunia.com/advisories/31687
- http://secunia.com/advisories/33314
- http://secunia.com/advisories/33937
- http://www.securityfocus.com/bid/28928
- http://www.securitytracker.com/id?1020253
- http://www.ubuntu.com/usn/usn-700-1
- http://www.ubuntu.com/usn/usn-700-2
- http://www.vmware.com/security/advisories/VMSA-2008-0013.html
- http://www.vupen.com/english/advisories/2008/2265/references
- http://www.vupen.com/english/advisories/2008/2361
- http://www.vupen.com/english/advisories/2008/2424
- http://www.vupen.com/english/advisories/2009/0422
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
- http://www.redhat.com/support/errata/RHSA-2008-0522.html
- http://www.redhat.com/support/errata/RHSA-2008-0532.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:100