https://bugzilla.redhat.com/show_bug.cgi?id=1187149
Bug ID: 1187149 Summary: CVE-2013-7422 perl: segmentation fault in S_regmatch on negative backreference Product: Security Response Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-t...@redhat.com Reporter: mpr...@redhat.com CC: cw...@alumni.drew.edu, iarn...@gmail.com, jples...@redhat.com, ka...@ucw.cz, perl-devel@lists.fedoraproject.org, perl-maint-l...@redhat.com, ppi...@redhat.com, psab...@redhat.com, rc040...@freenet.de, rmegg...@redhat.com, tcall...@redhat.com An integer underflow flaw was discovered in the way Perl parsed regular expression backreferences. An attacker able to supply a crafted regular expression to a Perl application could possibly use this flaw to crash that application. Reproducer: $ perl -e '/\7777777777/' Segmentation fault Upstream issue: https://rt.perl.org/Public/Bug/Display.html?id=119505 Upstream patch: http://perl5.git.perl.org/perl.git/commitdiff/0c2990d652e985784f095bba4bc356481a66aa06 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=WDfiMmElTR&a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel