https://bugzilla.redhat.com/show_bug.cgi?id=1492093 Bug ID: 1492093 Summary: CVE-2017-12883 perl: Buffer over-read in regular expression parser Product: Security Response Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-team@xxxxxxxxxx Reporter: amaris@xxxxxxxxxx CC: alexl@xxxxxxxxxx, caillon+fedoraproject@xxxxxxxxx, caolanm@xxxxxxxxxx, hhorak@xxxxxxxxxx, iarnell@xxxxxxxxx, jorton@xxxxxxxxxx, jplesnik@xxxxxxxxxx, kasal@xxxxxx, mbarnes@xxxxxxxxxxxx, perl-devel@xxxxxxxxxxxxxxxxxxxxxxx, perl-maint-list@xxxxxxxxxx, ppisar@xxxxxxxxxx, psabata@xxxxxxxxxx, rc040203@xxxxxxxxxx, rhughes@xxxxxxxxxx, sandmann@xxxxxxxxxx, tcallawa@xxxxxxxxxx For certain types of syntax error in a regular expression pattern, the error message could either contain the contents of a random, possibly large, chunk of memory, or could crash perl. Upstream patch: https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f Bug report (not public atm): https://rt.perl.org/Public/Bug/Display.html?id=131598 -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx