CPANSA-perl-2020-10878: perl vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2020-06-05T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2020-06-05T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 8.6 | Severity | High |
Original language | Language | en | |
Also referred to |
Vulnerability Description
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Vulnerabilities
CVE-2020-10878
Vulnerability DescriptionPerl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Weakness | CWE-190 : Integer Overflow or Wraparound |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
perl less than 5.28.3 |
|
||||||||||||
perl greater than or equal 5.30.0 and less than 5.30.3 |
|
Fixed
- perl greater than or equal 5.30.3
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-perl-2020-10878 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2020/cpansa-perl-2020-10878.json - https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 external
https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 - https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c external
https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c - https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 external
https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 - https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod external
https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod - https://security.netapp.com/advisory/ntap-20200611-0001/ external
https://security.netapp.com/advisory/ntap-20200611-0001/ - https://security.gentoo.org/glsa/202006-03 external
https://security.gentoo.org/glsa/202006-03 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ external
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ - http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html external
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html - https://www.oracle.com/security-alerts/cpuoct2020.html external
https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/security-alerts/cpujan2021.html external
https://www.oracle.com/security-alerts/cpujan2021.html - https://www.oracle.com/security-alerts/cpuApr2021.html external
https://www.oracle.com/security-alerts/cpuApr2021.html - https://www.oracle.com//security-alerts/cpujul2021.html external
https://www.oracle.com//security-alerts/cpujul2021.html - https://www.oracle.com/security-alerts/cpuoct2021.html external
https://www.oracle.com/security-alerts/cpuoct2021.html - https://www.oracle.com/security-alerts/cpujan2022.html external
https://www.oracle.com/security-alerts/cpujan2022.html - https://www.oracle.com/security-alerts/cpuapr2022.html external
https://www.oracle.com/security-alerts/cpuapr2022.html - https://perldoc.perl.org/perl5283delta external
https://perldoc.perl.org/perl5283delta - https://perldoc.perl.org/perl5303delta external
https://perldoc.perl.org/perl5303delta - https://perldoc.perl.org/perl5320delta external
https://perldoc.perl.org/perl5320delta - CVE-2020-10878 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2020-10878
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Fri Jun 5 00:00:00 2020 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/