CVE-2017-12883
Published: 19 September 2017
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
Priority
CVSS 3 base score: 9.1
Status
Package | Release | Status |
---|---|---|
perl Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(5.26.0-8ubuntu1)
|
precise |
Released
(5.14.2-6ubuntu2.6)
|
|
trusty |
Released
(5.18.2-2ubuntu1.3)
|
|
upstream |
Released
(5.26.0-8)
|
|
xenial |
Released
(5.22.1-9ubuntu0.2)
|
|
zesty |
Released
(5.24.1-2ubuntu1.1)
|
|
Patches: upstream: https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f |