From secunia security advisory ad $URL: Description: 1) An error within the "File::Glob::bsd_glob()" function when handling the GLOB_ALTDIRFUNC flag can be exploited to cause an access violation and potentially execute arbitrary code. 2) An error within the "decode_xs()" function in Encode can be exploited to cause a heap-based buffer overflow via specially crafted input. Solution: Update to version 5.14.2.
CVE-2011-2939 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2939): Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
CVE-2011-2728 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2728): The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
I don't suppose we're any closer to actually getting an unaffected version stable?
@security, vote please.
ah, B2, set as [glsa]
This issue was resolved and addressed in GLSA 201401-11 at http://security.gentoo.org/glsa/glsa-201401-11.xml by GLSA coordinator Chris Reffett (creffett).