[Bug 1069034] Re: [CVE-2012-5195] heap buffer overrun with the 'x' string repeat operator
Seth Arnold
1069034 at bugs.launchpad.net
Fri Nov 30 05:50:57 UTC 2012
** Changed in: perl (Ubuntu Natty)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to perl in Ubuntu.
https://bugs.launchpad.net/bugs/1069034
Title:
[CVE-2012-5195] heap buffer overrun with the 'x' string repeat
operator
Status in “perl” package in Ubuntu:
Confirmed
Status in “perl” source package in Lucid:
Fix Released
Status in “perl” source package in Natty:
Won't Fix
Status in “perl” source package in Oneiric:
Fix Released
Status in “perl” source package in Precise:
Fix Released
Status in “perl” source package in Quantal:
Fix Released
Status in “perl” source package in Raring:
Confirmed
Status in “perl” source package in Hardy:
Fix Released
Bug description:
The following commit appeared in 5.14.3 and Debian 5.14.3-14:
commit 5ee2604e72cdd836101f279f8f9e89243c7f0097
Author: Andy Dougherty <doughera at lafayette.edu>
Date: Thu Sep 27 09:52:18 2012 -0400
avoid calling memset with a negative count
Poorly written perl code that allows an attacker to specify the count to
perl's 'x' string repeat operator can already cause a memory exhaustion
denial-of-service attack. A flaw in versions of perl before 5.15.5 can
escalate that into a heap buffer overrun; coupled with versions of glibc
before 2.16, it possibly allows the execution of arbitrary code.
The flaw addressed to this commit has been assigned identifier
CVE-2012-5195.
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg194057.html
http://patch-tracker.debian.org/patch/series/view/perl/5.14.2-14/fixes/string_repeat_overrun.diff
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/perl/+bug/1069034/+subscriptions
More information about the foundations-bugs
mailing list