MGASA-2018-0049

Source
https://advisories.mageia.org/MGASA-2018-0049.html
Import Source
https://advisories.mageia.org/MGASA-2018-0049.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0049
Related
Published
2018-01-03T15:50:51Z
Modified
2018-01-03T15:27:14Z
Summary
Updated perl packages fix security vulnerability
Details

Jakub Wilk reported a heap buffer overflow flaw in the regular expression compiler, allowing a remote attacker to cause a denial of service via a specially crafted regular expression with the case-insensitive modifier (CVE-2017-12837).

Jakub Wilk reported a buffer over-read flaw in the regular expression parser, allowing a remote attacker to cause a denial of service or information leak (CVE-2017-12883).

References
Credits

Affected packages

Mageia:6 / perl

Package

Name
perl
Purl
pkg:rpm/mageia/perl?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.22.3-3.1.mga6

Ecosystem specific

{
    "section": "core"
}