{"id":"DEBIAN-CVE-2011-2939","details":"Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.","modified":"2026-03-11T07:01:43.397319Z","published":"2012-01-13T18:55:02.987Z","upstream":["CVE-2011-2939"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2011-2939"}],"affected":[{"package":{"name":"libencode-perl","ecosystem":"Debian:11","purl":"pkg:deb/debian/libencode-perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.44-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"libencode-perl","ecosystem":"Debian:12","purl":"pkg:deb/debian/libencode-perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.44-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"libencode-perl","ecosystem":"Debian:13","purl":"pkg:deb/debian/libencode-perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.44-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"libencode-perl","ecosystem":"Debian:14","purl":"pkg:deb/debian/libencode-perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.44-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"perl","ecosystem":"Debian:11","purl":"pkg:deb/debian/perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.12.4-4"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"perl","ecosystem":"Debian:12","purl":"pkg:deb/debian/perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.12.4-4"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"perl","ecosystem":"Debian:13","purl":"pkg:deb/debian/perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.12.4-4"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}},{"package":{"name":"perl","ecosystem":"Debian:14","purl":"pkg:deb/debian/perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.12.4-4"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-2939.json"}}],"schema_version":"1.7.5"}