- ------------------------------------------------------------------------- Debian Security Advisory DSA-3982-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Salvatore Bonaccorso September 21, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : perl CVE ID : CVE-2017-12837 CVE-2017-12883 Debian Bug : 875596 875597 Multiple vulnerabilities were discovered in the implementation of the Perl programming language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-12837 Jakub Wilk reported a heap buffer overflow flaw in the regular expression compiler, allowing a remote attacker to cause a denial of service via a specially crafted regular expression with the case-insensitive modifier. CVE-2017-12883 Jakub Wilk reported a buffer over-read flaw in the regular expression parser, allowing a remote attacker to cause a denial of service or information leak. For the oldstable distribution (jessie), these problems have been fixed in version 5.20.2-3+deb8u9. For the stable distribution (stretch), these problems have been fixed in version 5.24.1-3+deb9u2. For the testing distribution (buster), these problems have been fixed in version 5.26.0-8. For the unstable distribution (sid), these problems have been fixed in version 5.26.0-8. We recommend that you upgrade your perl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Debian: DSA-3982-1: perl security update
Multiple vulnerabilities were discovered in the implementation of the Perl programming language. The Common Vulnerabilities and Exposures project identifies the following problems:
You are not authorised to post comments.