SUSE Security Update: Security update for perl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:1682-2
Rating:             important
References:         #1171863 #1171864 #1171866 #1172348 
Cross-References:   CVE-2020-10543 CVE-2020-10878 CVE-2020-12723
                   
Affected Products:
                    SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for perl fixes the following issues:

   - CVE-2020-10543: Fixed a heap buffer overflow in regular expression
     compiler which could have allowed overwriting of allocated memory with
     attacker's data (bsc#1171863).
   - CVE-2020-10878: Fixed multiple integer overflows which could have
     allowed the insertion of instructions into the compiled form of Perl
     regular expression (bsc#1171864).
   - CVE-2020-12723: Fixed an attacker's corruption of the intermediate
     language state of a compiled regular expression (bsc#1171866).
   - Fixed a bad warning in features.ph (bsc#1172348).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1:

      zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1682=1



Package List:

   - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 (x86_64):

      perl-32bit-5.26.1-7.12.1
      perl-32bit-debuginfo-5.26.1-7.12.1
      perl-debugsource-5.26.1-7.12.1


References:

   https://www.suse.com/security/cve/CVE-2020-10543.html
   https://www.suse.com/security/cve/CVE-2020-10878.html
   https://www.suse.com/security/cve/CVE-2020-12723.html
   https://bugzilla.suse.com/1171863
   https://bugzilla.suse.com/1171864
   https://bugzilla.suse.com/1171866
   https://bugzilla.suse.com/1172348

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:1682-2 important: perl

July 7, 2020
An update that solves three vulnerabilities and has one errata is now available

Summary

This update for perl fixes the following issues: - CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have allowed overwriting of allocated memory with attacker's data (bsc#1171863). - CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of instructions into the compiled form of Perl regular expression (bsc#1171864). - CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a compiled regular expression (bsc#1171866). - Fixed a bad warning in features.ph (bsc#1172348). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1682=1 Package List: - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1 (x86_64): perl-32bit-5.26.1-7.12.1 perl-32bit-debuginfo-5.26.1-7.12.1 perl-debugsource-5.26.1-7.12.1

References

#1171863 #1171864 #1171866 #1172348

Cross- CVE-2020-10543 CVE-2020-10878 CVE-2020-12723

Affected Products:

SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP1

https://www.suse.com/security/cve/CVE-2020-10543.html

https://www.suse.com/security/cve/CVE-2020-10878.html

https://www.suse.com/security/cve/CVE-2020-12723.html

https://bugzilla.suse.com/1171863

https://bugzilla.suse.com/1171864

https://bugzilla.suse.com/1171866

https://bugzilla.suse.com/1172348

Severity
Announcement ID: SUSE-SU-2020:1682-2
Rating: important

Related News