Bug 378141

Summary: CVE-2007-5116 perl regular expression UTF parsing errors [f8]
Product: [Fedora] Fedora Reporter: Tomas Hoger <thoger>
Component: perlAssignee: Robin Norwood <robin.norwood>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: high    
Version: 8CC: kasal, rc040203, tcallawa
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://fedoraproject.org/wiki/Security/TrackingBugs
Fixed In Version: 5.8.8-31.fc8 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-11-12 19:00:25 EST Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On:    
Bug Blocks: 323571    

Description Tomas Hoger 2007-11-12 11:09:17 EST
This is an automatically created tracking bug!

It was created to ensure that one or more security vulnerabilities are fixed in all affected releases. You should not refer to it anywhere except in the update system as it is a private "Fedora Project Contributors" bug. The update system should close this bug it once the update is pushed.

For comments that are specific to a vulnerability please use bugs filed against "Security Response" product referenced in "Blocks" field.

	bug #323571: CVE-2007-5116 perl regular expression UTF parsing errors

When creating an update for the version this this bug is reported against please include the bug IDs of respective bugs filed against "Security Response" product as well as of this bug. Please note that the update announcement will (and should) contain only references to "Security Response" bugs as long as the tracking bug is restricted to "Fedora Project Contributors".

For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs
Comment 1 Fedora Update System 2007-11-12 19:00:23 EST
perl-5.8.8-31.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.