https://bugzilla.redhat.com/show_bug.cgi?id=1492093

            Bug ID: 1492093
           Summary: CVE-2017-12883 perl: Buffer over-read in regular
                    expression parser
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: ama...@redhat.com
                CC: al...@redhat.com, caillon+fedoraproj...@gmail.com,
                    caol...@redhat.com, hho...@redhat.com,
                    iarn...@gmail.com, jor...@redhat.com,
                    jples...@redhat.com, ka...@ucw.cz,
                    mbar...@fastmail.com,
                    perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    psab...@redhat.com, rc040...@freenet.de,
                    rhug...@redhat.com, sandm...@redhat.com,
                    tcall...@redhat.com



For certain types of syntax error in a regular expression pattern, the error
message could either contain the contents of a random, possibly large, chunk of
memory, or could crash perl.

Upstream patch:

https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f

Bug report (not public atm):

https://rt.perl.org/Public/Bug/Display.html?id=131598

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org

Reply via email to