An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1042004 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2018:1192 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1040681 | vdb entry third party advisory |
https://usn.ubuntu.com/3625-1/ | third party advisory vendor advisory |
https://www.debian.org/security/2018/dsa-4172 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201909-01 | vendor advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | |
https://rt.perl.org/Public/Bug/Display.html?id=132227 | patch vendor advisory |