[Bug 1069034] Re: [CVE-2012-5195] heap buffer overrun with the 'x' string repeat operator
Launchpad Bug Tracker
1069034 at bugs.launchpad.net
Fri Nov 30 01:47:32 UTC 2012
This bug was fixed in the package perl - 5.10.1-8ubuntu2.2
---------------
perl (5.10.1-8ubuntu2.2) lucid-security; urgency=low
* SECURITY UPDATE: Injection problem in Digest::new
- CVE-2011-3597
* SECURITY UPDATE: Off-by-one via crafted Unicode string in Unicode.xs
- CVE-2011-2939
* SECURITY UPDATE: Heap overflow in "x" operator (LP: #1069034)
- CVE-2012-5195
* SECURITY UPDATE: CGI.pm improper cookie and p3p CRLF escaping
- CVE-2012-5526
-- Seth Arnold <seth.arnold at canonical.com> Mon, 26 Nov 2012 11:27:38 -0800
** Changed in: perl (Ubuntu Quantal)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to perl in Ubuntu.
https://bugs.launchpad.net/bugs/1069034
Title:
[CVE-2012-5195] heap buffer overrun with the 'x' string repeat
operator
Status in “perl” package in Ubuntu:
Confirmed
Status in “perl” source package in Lucid:
Fix Released
Status in “perl” source package in Natty:
Confirmed
Status in “perl” source package in Oneiric:
Fix Released
Status in “perl” source package in Precise:
Fix Released
Status in “perl” source package in Quantal:
Fix Released
Status in “perl” source package in Raring:
Confirmed
Status in “perl” source package in Hardy:
Fix Released
Bug description:
The following commit appeared in 5.14.3 and Debian 5.14.3-14:
commit 5ee2604e72cdd836101f279f8f9e89243c7f0097
Author: Andy Dougherty <doughera at lafayette.edu>
Date: Thu Sep 27 09:52:18 2012 -0400
avoid calling memset with a negative count
Poorly written perl code that allows an attacker to specify the count to
perl's 'x' string repeat operator can already cause a memory exhaustion
denial-of-service attack. A flaw in versions of perl before 5.15.5 can
escalate that into a heap buffer overrun; coupled with versions of glibc
before 2.16, it possibly allows the execution of arbitrary code.
The flaw addressed to this commit has been assigned identifier
CVE-2012-5195.
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg194057.html
http://patch-tracker.debian.org/patch/series/view/perl/5.14.2-14/fixes/string_repeat_overrun.diff
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/perl/+bug/1069034/+subscriptions
More information about the foundations-bugs
mailing list