https://bugzilla.redhat.com/show_bug.cgi?id=1187149

            Bug ID: 1187149
           Summary: CVE-2013-7422 perl: segmentation fault in S_regmatch
                    on negative backreference
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: mpr...@redhat.com
                CC: cw...@alumni.drew.edu, iarn...@gmail.com,
                    jples...@redhat.com, ka...@ucw.cz,
                    perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    psab...@redhat.com, rc040...@freenet.de,
                    rmegg...@redhat.com, tcall...@redhat.com



An integer underflow flaw was discovered in the way Perl parsed regular
expression backreferences. An attacker able to supply a crafted regular
expression to a Perl application could possibly use this flaw to crash that
application.

Reproducer:

$ perl -e '/\7777777777/'
Segmentation fault

Upstream issue:

https://rt.perl.org/Public/Bug/Display.html?id=119505

Upstream patch:

http://perl5.git.perl.org/perl.git/commitdiff/0c2990d652e985784f095bba4bc356481a66aa06

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=WDfiMmElTR&a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/perl-devel

Reply via email to