Wind River Support Network

HomeOther DownloadsBuffer overflow in perl 5.8 - CVE-2007-5116
Recommended Type: Patch

Buffer overflow in perl 5.8 - CVE-2007-5116

Released: Apr 22, 2008     Updated: Apr 22, 2008


Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. IDENTIFIER = WIND00118333

Product Version

Linux Platforms 2.0


Installation Notes

Installation Notes for 2.0 for 1.5 for 1.4

1. Unzip the patch under [install_dir]/updates

2. Install the patch CD by entering the patch CD directory and run setup_linux.

3. This is a source only patch so you will have to build the fs

4. Issue a make fs and make the kernel in a configured directory.

5. Upload the kernel and rootfs into the target and boot it up.

Live chat