HP Security Bulletin - Potential security vulnerabilities have been identified in Perl 5.8.2 and earlier running on HP Tru64 UNIX. These vulnerabilities could be exploited by a local user to execute unauthorized code.
d23a8ee6f8d087198ee77c28904792640cf69c9be7a9730cfe5d3211938739c9
Debian Security Advisory DSA 943-1 - Jack Louis discovered an integer overflow in Perl, Larry Wall's Practical Extraction and Report Language, that allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via specially crafted content that is passed to vulnerable format strings of third party software.
418585b662fa3f0b96fc83f0a0222571bfad3e5b4be53af7f5c8f8187924280a
Trustix Secure Linux Security Advisory #2005-0070 - Multiple kernel vulnerabilities and a perl vulnerability have been addressed in this advisory.
9fb8586d1071b91a0ddf0e2fd5bab8c2f75ccfb7324332719c2e70603832cd40
Ubuntu Security Notice USN-222-1 - Jack Louis of Dyad Security discovered that Perl did not sufficiently check the explicit length argument in format strings. Specially crafted format strings with overly large length arguments led to a crash of the Perl interpreter or even to execution of arbitrary attacker-defined code with the privileges of the user running the Perl program.
bfe55a56e657241ef7dc2839ec85a1d525daa274af5d85c1db814fa6967a6512