*** This bug is a security vulnerability ***

Public security bug reported:

The following commit appeared in 5.14.3 and Debian 5.14.3-14:

  commit 5ee2604e72cdd836101f279f8f9e89243c7f0097
  Author: Andy Dougherty <dough...@lafayette.edu>
  Date:   Thu Sep 27 09:52:18 2012 -0400

      avoid calling memset with a negative count
      
      Poorly written perl code that allows an attacker to specify the count to
      perl's 'x' string repeat operator can already cause a memory exhaustion
      denial-of-service attack. A flaw in versions of perl before 5.15.5 can
      escalate that into a heap buffer overrun; coupled with versions of glibc
      before 2.16, it possibly allows the execution of arbitrary code.
      
      The flaw addressed to this commit has been assigned identifier
      CVE-2012-5195.

http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg194057.html
http://patch-tracker.debian.org/patch/series/view/perl/5.14.2-14/fixes/string_repeat_overrun.diff

** Affects: perl (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5195

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1069034

Title:
  [CVE-2012-5195] heap buffer overrun with the 'x' string repeat
  operator

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/perl/+bug/1069034/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to