1
PublicDateAtUSN: 2016-05-25
2
Candidate: CVE-2015-8853
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
6
http://www.openwall.com/lists/oss-security/2016/04/20/5
7
https://usn.ubuntu.com/usn/usn-3625-1
8
https://usn.ubuntu.com/usn/usn-3625-2
10
The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in
11
regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause
12
a denial of service (infinite loop) via crafted utf-8 data, as demonstrated
17
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=821848
18
https://rt.perl.org/Public/Bug/Display.html?id=123562
24
upstream: https://perl5.git.perl.org/perl.git/commit/22b433eff9a1ffa2454e18405a56650f07b385b5
25
upstream: https://perl5.git.perl.org/perl.git/commit/d820a0ff34c7df39297a54193fd756bb42c5c06e
26
upstream_perl: released (5.22.1-1)
27
precise_perl: ignored (reached end-of-life)
28
precise/esm_perl: released (5.14.2-6ubuntu2.7)
29
trusty_perl: released (5.18.2-2ubuntu1.4)
30
vivid/stable-phone-overlay_perl: ignored (reached end-of-life)
31
vivid/ubuntu-core_perl: ignored (reached end-of-life)
32
wily_perl: ignored (reached end-of-life)
33
xenial_perl: not-affected (5.22.1-9)
34
yakkety_perl: not-affected (5.22.1-9)
35
zesty_perl: not-affected (5.22.1-9)
36
artful_perl: not-affected (5.22.1-9)
37
devel_perl: not-affected (5.22.1-9)