Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 690502

Summary: testbug
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: major    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: A2 [ebuild]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2019-07-23 14:15:15 UTC
CVE-2017-12883 (https://nvd.nist.gov/vuln/detail/CVE-2017-12883):
  Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5
  before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to
  disclose sensitive information or cause a denial of service (application
  crash) via a crafted regular expression with an invalid '\N{U+...}' escape.

CVE-2017-12837 (https://nvd.nist.gov/vuln/detail/CVE-2017-12837):
  Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5
  before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to
  cause a denial of service (out-of-bounds write) via a regular expression
  with a '\N{}' escape and the case-insensitive modifier.


Just a test.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2019-07-23 14:16:39 UTC
Was just a test bug for testing GLSAmaker.