CVE-2020-10878
HIGH | Platform: macOS | Changelog
CVE Details
Description
Perl before 5.30.3 has an integer overflow related to mishandling of a “PL_regkind[OP(n)] == NOTHING” situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
CVSS 3.1 Score
| Metric | Value |
|---|---|
| Base Score | 8.6 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H |
Weakness
References
- Apple Security Advisory
- NVD Entry
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html (Mailing List, Third Party Advisory)
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod (Third Party Advisory)
- https://github.com/Perl/perl5/compare/v5.30.2…v5.30.3 (Patch, Third Party Advisory)
- https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 (Patch, Third Party Advisory)
- https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c (Patch, Third Party Advisory)
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
- https://security.gentoo.org/glsa/202006-03 (Third Party Advisory)
- https://security.netapp.com/advisory/ntap-20200611-0001/ (Third Party Advisory)