[Bug 1069034] Re: [CVE-2012-5195] heap buffer overrun with the 'x' string repeat operator

Colin Watson cjwatson at canonical.com
Wed Apr 17 23:24:36 UTC 2013


Fixed some time ago in raring:

perl (5.14.2-14) unstable; urgency=high

  * [SECURITY] CVE-2012-5195: fix a heap buffer overrun with
    the 'x' string repeat operator. (Closes: #689314)

 -- Niko Tyni <ntyni at debian.org>  Wed, 10 Oct 2012 21:17:36 +0300

** Changed in: perl (Ubuntu Raring)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to perl in Ubuntu.
https://bugs.launchpad.net/bugs/1069034

Title:
  [CVE-2012-5195] heap buffer overrun with the 'x' string repeat
  operator

Status in “perl” package in Ubuntu:
  Fix Released
Status in “perl” source package in Lucid:
  Fix Released
Status in “perl” source package in Natty:
  Won't Fix
Status in “perl” source package in Oneiric:
  Fix Released
Status in “perl” source package in Precise:
  Fix Released
Status in “perl” source package in Quantal:
  Fix Released
Status in “perl” source package in Raring:
  Fix Released
Status in “perl” source package in Hardy:
  Fix Released

Bug description:
  The following commit appeared in 5.14.3 and Debian 5.14.3-14:

    commit 5ee2604e72cdd836101f279f8f9e89243c7f0097
    Author: Andy Dougherty <doughera at lafayette.edu>
    Date:   Thu Sep 27 09:52:18 2012 -0400

        avoid calling memset with a negative count
        
        Poorly written perl code that allows an attacker to specify the count to
        perl's 'x' string repeat operator can already cause a memory exhaustion
        denial-of-service attack. A flaw in versions of perl before 5.15.5 can
        escalate that into a heap buffer overrun; coupled with versions of glibc
        before 2.16, it possibly allows the execution of arbitrary code.
        
        The flaw addressed to this commit has been assigned identifier
        CVE-2012-5195.

  http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
  http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg194057.html
  http://patch-tracker.debian.org/patch/series/view/perl/5.14.2-14/fixes/string_repeat_overrun.diff

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/perl/+bug/1069034/+subscriptions




More information about the foundations-bugs mailing list