Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=47fcfefc050efd525e8115f377928a81d7a7407d

commit 47fcfefc050efd525e8115f377928a81d7a7407d
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Tue Nov 27 20:46:30 2007 +0100

FSA322-perl

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 9deaaca..85a4c17 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,18 @@

<fsas>
<fsa>
+               <id>322</id>
+               <date>2007-11-27</date>
+               <author>voroskoi</author>
+               <package>perl</package>
+               <vulnerable>5.8.8-4</vulnerable>
+               <unaffected>5.8.8-5sayshell1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2568</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116</cve>
+               <desc>Tavis Ormandy and Will Drewry have reported a 
vulnerability in Perl, which potentially can be exploited by malicious people 
to compromise a vulnerable system.
+                       The vulnerability is caused due to a boundary error 
within the processing of regular expressions containing Unicode data. This can 
be exploited to cause a buffer overflow via a specially crafted regular 
expression causing a runtime switch to the Unicode character scheme.</desc>
+       </fsa>
+       <fsa>
<id>321</id>
<date>2007-11-27</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to