Bug 51706 - perl: Multiple issues (4.4)
perl: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-5-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-07-22 15:02 CEST by Quality Assurance
Modified: 2020-07-29 16:50 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-07-22 15:02:02 CEST
New Debian perl 5.24.1-3+deb9u7 fixes:
This update addresses the following issues:
* heap-based buffer overflow in regular expression compiler leads to DoS  (CVE-2020-10543)
* corruption of intermediate language state of compiled regular expression  due to integer overflow leads to DoS (CVE-2020-10878)
* corruption of intermediate language state of compiled regular expression  due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)
Comment 1 Quality Assurance univentionstaff 2020-07-23 13:16:51 CEST
--- mirror/ftp/4.4/unmaintained/4.4-4/source/perl_5.24.1-3+deb9u6.dsc
+++ apt/ucs_4.4-0-errata4.4-5/source/perl_5.24.1-3+deb9u7.dsc
@@ -1,3 +1,14 @@
+5.24.1-3+deb9u7 [Sat, 20 Jun 2020 18:33:46 +0100] Dominic Hargreaves <dom@earth.li>:
+
+  * Multiple regexp security fixes (Closes: #962005)
+     + [SECURITY] CVE-2020-10543: Buffer overflow caused by a crafted
+       regular expression
+     + [SECURITY] CVE-2020-10878: Integer overflow via malformed bytecode
+       produced by a crafted regular expression
+     + [SECURITY] CVE-2020-12723: Buffer overflow caused by a crafted
+       regular expression
+  * Fix FTBFS with IPv6-only host (Closes: #962019)
+
 5.24.1-3+deb9u6 [Sat, 25 Jan 2020 19:54:54 +0200] Niko Tyni <ntyni@debian.org>:
 
   * Add backported Time-Local patch by Bernhard M. Wiedemann fixing test

<http://10.200.17.11/4.4-5/#5732944496850610630>
Comment 2 Philipp Hahn univentionstaff 2020-07-23 16:37:28 CEST
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-5] f02aba1a69 Bug #51706: perl 5.24.1-3+deb9u7
 doc/errata/staging/perl.yaml | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

[4.4-5] 481bed547e Bug #51706: perl 5.24.1-3+deb9u7
 doc/errata/staging/perl.yaml | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)