CVE-2020-10878: perl: perl before 5.30.3 has an integer overflow
Bug #1918154 reported by
Ghada Khalil
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Joe Slater |
Bug Description
CVE-2020-10878: perl: perl before 5.30.3 has an integer overflow
CVSSv2: 7.5 (AV:N/AC:
Description:
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
References:
https:/
https:/
https:/
Required package version:
perl-5.
Packages:
perl
Found during March 2021 StarlingX CVE Scan on stx master
CVE References
- 2016-10739
- 2017-6519
- 2018-10360
- 2018-1116
- 2018-1122
- 2018-12404
- 2018-1312
- 2018-13139
- 2018-14348
- 2018-14498
- 2018-15473
- 2018-17199
- 2018-18384
- 2018-19519
- 2018-4700
- 2018-5741
- 2018-5742
- 2018-5743
- 2018-8905
- 2019-0220
- 2019-10160
- 2019-10218
- 2019-11068
- 2019-11745
- 2019-12735
- 2019-13232
- 2019-13734
- 2019-16056
- 2019-17006
- 2019-3813
- 2019-3880
- 2019-5482
- 2019-6477
- 2019-9636
- 2019-9924
- 2019-9948
- 2020-0549
- 2020-10772
- 2020-10878
- 2020-12049
- 2020-12663
- 2020-5208
- 2020-6851
- 2020-8112
- 2020-8617
- 2021-26937
tags: | added: stx.5.0 stx.security |
description: | updated |
Changed in starlingx: | |
importance: | Undecided → High |
status: | New → Triaged |
Changed in starlingx: | |
assignee: | nobody → Joe Slater (jslater0wind) |
Changed in starlingx: | |
status: | Triaged → Fix Released |
To post a comment you must log in.
Adding review for easy tracking: https:/ /review. opendev. org/c/starlingx /tools/ +/779819