First published: Fri Sep 15 2017(Updated: )
Compiling certain regular expression patterns with the case-insensitive modifier could cause a heap buffer overflow and crash perl. Upstream patch: <a href="https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5">https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5</a> Bug report : <a href="https://rt.perl.org/Public/Bug/Display.html?id=131582">https://rt.perl.org/Public/Bug/Display.html?id=131582</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Perl 5.30.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1492091 is classified as high due to the potential for a heap buffer overflow and subsequent application crash.
To fix REDHAT-BUG-1492091, ensure you apply the latest patch provided by the Perl development team.
REDAHT-BUG-1492091 affects certain versions of Perl that allow case-insensitive regex compilation.
Yes, REDHAT-BUG-1492091 can potentially be exploited remotely if an attacker provides malicious input to a vulnerable Perl application.
The impact of REDHAT-BUG-1492091 on system stability can lead to crashes and unanticipated behavior in affected Perl applications.