First published: Fri Sep 15 2017(Updated: )
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl | <5.24.3 | 5.24.3 |
redhat/perl | <5.26.1 | 5.26.1 |
redhat/perl | <5.27.4 | 5.27.4 |
Perl | <=5.24.2 | |
Perl | =5.26.0 |
https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.