[Bug 1069034] Re: [CVE-2012-5195] heap buffer overrun with the 'x' string repeat operator

Launchpad Bug Tracker 1069034 at bugs.launchpad.net
Fri Nov 30 01:47:32 UTC 2012


This bug was fixed in the package perl - 5.10.1-8ubuntu2.2

---------------
perl (5.10.1-8ubuntu2.2) lucid-security; urgency=low

  * SECURITY UPDATE: Injection problem in Digest::new
    - CVE-2011-3597
  * SECURITY UPDATE: Off-by-one via crafted Unicode string in Unicode.xs
    - CVE-2011-2939
  * SECURITY UPDATE: Heap overflow in "x" operator (LP: #1069034)
    - CVE-2012-5195
  * SECURITY UPDATE: CGI.pm improper cookie and p3p CRLF escaping
    - CVE-2012-5526
 -- Seth Arnold <seth.arnold at canonical.com>   Mon, 26 Nov 2012 11:27:38 -0800

** Changed in: perl (Ubuntu Quantal)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to perl in Ubuntu.
https://bugs.launchpad.net/bugs/1069034

Title:
  [CVE-2012-5195] heap buffer overrun with the 'x' string repeat
  operator

Status in “perl” package in Ubuntu:
  Confirmed
Status in “perl” source package in Lucid:
  Fix Released
Status in “perl” source package in Natty:
  Confirmed
Status in “perl” source package in Oneiric:
  Fix Released
Status in “perl” source package in Precise:
  Fix Released
Status in “perl” source package in Quantal:
  Fix Released
Status in “perl” source package in Raring:
  Confirmed
Status in “perl” source package in Hardy:
  Fix Released

Bug description:
  The following commit appeared in 5.14.3 and Debian 5.14.3-14:

    commit 5ee2604e72cdd836101f279f8f9e89243c7f0097
    Author: Andy Dougherty <doughera at lafayette.edu>
    Date:   Thu Sep 27 09:52:18 2012 -0400

        avoid calling memset with a negative count
        
        Poorly written perl code that allows an attacker to specify the count to
        perl's 'x' string repeat operator can already cause a memory exhaustion
        denial-of-service attack. A flaw in versions of perl before 5.15.5 can
        escalate that into a heap buffer overrun; coupled with versions of glibc
        before 2.16, it possibly allows the execution of arbitrary code.
        
        The flaw addressed to this commit has been assigned identifier
        CVE-2012-5195.

  http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
  http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg194057.html
  http://patch-tracker.debian.org/patch/series/view/perl/5.14.2-14/fixes/string_repeat_overrun.diff

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/perl/+bug/1069034/+subscriptions




More information about the foundations-bugs mailing list