[Bug 1646734] CVE-2018-18312 perl: Heap-based buffer overflow in S_handle_regex_sets()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1646734

Paul Harvey <pharvey@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Whiteboard|impact=moderate,public=2018 |impact=moderate,public=2018
                   |1129,reported=20181105,sour |1129,reported=20181105,sour
                   |ce=upstream,cvss3=7.0/CVSS: |ce=upstream,cvss3=7.0/CVSS:
                   |3.0/AV:N/AC:H/PR:N/UI:N/S:U |3.0/AV:N/AC:H/PR:N/UI:N/S:U
                   |/C:L/I:L/A:H,cwe=CWE-22,rhe |/C:L/I:L/A:H,cwe=CWE-22,rhe
                   |l-6/perl=notaffected,opensh |l-6/perl=notaffected,opensh
                   |ift-enterprise-3/perl=new,f |ift-enterprise-3/perl=notaf
                   |edora-all/perl=affected,rhe |fected,fedora-all/perl=affe
                   |l-5/perl=notaffected,rhel-7 |cted,rhel-5/perl=notaffecte
                   |/perl=notaffected,openshift |d,rhel-7/perl=notaffected,o
                   |-online-3/perl=new,rhel-8/p |penshift-online-3/perl=nota
                   |erl=affected,rhscl-3/rh-per |ffected,rhel-8/perl=affecte
                   |l526-perl=affected,rhscl-3/ |d,rhscl-3/rh-perl526-perl=a
                   |rh-perl524-perl=affected,rh |ffected,rhscl-3/rh-perl524-
                   |el-8/perl:5.24/perl=affecte |perl=affected,rhel-8/perl:5
                   |d                           |.24/perl=affected



--- Comment #9 from Paul Harvey <pharvey@xxxxxxxxxx> ---
openshift-enterprise-3: notaffected. I reviewed OpenShift containers for
applications with dependencies on perl and was unable to identify any where the
perl interpreter would be exposed to attacker-controlled regular expressions
which could expose this flaw. There is a perl dependency in our MariaDB
packaging, however the only non-test related perl usage is in a backup script
(mysqlhotcopy) which is not exposed to attacker-controlled regular expressions.
I have not filed trackers as these images will inherit the existing perl fixes
next time they are respun. See also https://access.redhat.com/articles/2803031

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]

  Powered by Linux