Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 26 Oct 2012 09:48:39 +0100
From: Tim Brown <timb@...-dimension.org.uk>
To: oss-security@...ts.openwall.com
Subject: Medium severity flaw with Perl 5

I recently discovered that Perl 5 interpreter is vulnerable to memory 
corruption when large values are supplied to the x operator.

After discussions with the vendor, CVE-2012-5195 was assigned to this 
vulnerability.

I know Red Hat and Debian have picked it up, but I'm not sure about other 
vendors.

Tim
-- 
Tim Brown
<mailto:timb@...-dimension.org.uk>
<http://www.nth-dimension.org.uk/>

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ