Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 690502 - testbug
Summary: testbug
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A2 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-07-23 14:15 UTC by GLSAMaker/CVETool Bot
Modified: 2019-07-23 14:16 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2019-07-23 14:15:15 UTC
CVE-2017-12883 (https://nvd.nist.gov/vuln/detail/CVE-2017-12883):
  Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5
  before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to
  disclose sensitive information or cause a denial of service (application
  crash) via a crafted regular expression with an invalid '\N{U+...}' escape.

CVE-2017-12837 (https://nvd.nist.gov/vuln/detail/CVE-2017-12837):
  Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5
  before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to
  cause a denial of service (out-of-bounds write) via a regular expression
  with a '\N{}' escape and the case-insensitive modifier.


Just a test.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2019-07-23 14:16:39 UTC
Was just a test bug for testing GLSAmaker.