Buffer overflow in the Sgrokbslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "perl-debug": "5.18.2-2ubuntu1.3", "perl": "5.18.2-2ubuntu1.3", "perl-modules": "5.18.2-2ubuntu1.3", "libperl-dev": "5.18.2-2ubuntu1.3", "libperl5.18": "5.18.2-2ubuntu1.3", "libcgi-fast-perl": "5.18.2-2ubuntu1.3", "perl-doc": "5.18.2-2ubuntu1.3", "perl-base": "5.18.2-2ubuntu1.3" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "perl-debug": "5.22.1-9ubuntu0.2", "perl": "5.22.1-9ubuntu0.2", "perl-modules-5.22": "5.22.1-9ubuntu0.2", "libperl-dev": "5.22.1-9ubuntu0.2", "libperl5.22": "5.22.1-9ubuntu0.2", "perl-doc": "5.22.1-9ubuntu0.2", "perl-base": "5.22.1-9ubuntu0.2" } ] }