Will Drewry and Tavis Ormandy of the Google Security Team have discovered a UTF-8 related heap overflow in Perl's regular expression compiler, probably allowing attackers to execute arbitrary code by compiling specially crafted regular expressions. For the old stable distribution (sarge), this problem has been fixed in version 5.8.4-8sarge6. For the stable distribution (etch), this problem has been fixed in version 5.8.8-7etch1. For the unstable distribution (sid), this problem will be fixed soon. Some architectures are missing from this DSA; these updates will be released once they are available. We recommend that you upgrade your perl package.
Will Drewry and Tavis Ormandy of the Google Security Team have discovered a UTF-8 related heap overflow in Perl's regular expression compiler, probably allowing attackers to execute arbitrary code by compiling specially crafted regular expressions.
For the old stable distribution (sarge), this problem has been fixed in version 5.8.4-8sarge6.
For the stable distribution (etch), this problem has been fixed in version 5.8.8-7etch4.
For the unstable distribution (sid), this problem will be fixed soon.
Some architectures are missing from this DSA; these updates will be released once they are available.
We recommend that you upgrade your perl package.
MD5 checksums of the listed files are available in the original advisory.