Описание
Security update for perl
This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.1
perl-5.26.1-lp151.9.6.1
perl-32bit-5.26.1-lp151.9.6.1
perl-base-5.26.1-lp151.9.6.1
perl-base-32bit-5.26.1-lp151.9.6.1
perl-doc-5.26.1-lp151.9.6.1
Ссылки
- E-Mail link for openSUSE-SU-2020:0850-1
- SUSE Security Ratings
- SUSE Bug 1171863
- SUSE Bug 1171864
- SUSE Bug 1171866
- SUSE Bug 1172348
- SUSE CVE CVE-2020-10543 page
- SUSE CVE CVE-2020-10878 page
- SUSE CVE CVE-2020-12723 page
Описание
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
Затронутые продукты
openSUSE Leap 15.1:perl-32bit-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-base-32bit-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-base-5.26.1-lp151.9.6.1
Ссылки
- CVE-2020-10543
- SUSE Bug 1171863
- SUSE Bug 1225627
Описание
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Затронутые продукты
openSUSE Leap 15.1:perl-32bit-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-base-32bit-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-base-5.26.1-lp151.9.6.1
Ссылки
- CVE-2020-10878
- SUSE Bug 1171864
- SUSE Bug 1225627
Описание
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
Затронутые продукты
openSUSE Leap 15.1:perl-32bit-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-base-32bit-5.26.1-lp151.9.6.1
openSUSE Leap 15.1:perl-base-5.26.1-lp151.9.6.1
Ссылки
- CVE-2020-12723
- SUSE Bug 1171866
- SUSE Bug 1225627