CVE-2020-12723
HIGH | Platform: macOS | Changelog
CVE Details
Description
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
CVSS 3.1 Score
| Metric | Value |
|---|---|
| Base Score | 7.5 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Weakness
References
- Apple Security Advisory
- NVD Entry
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html (Mailing List, Third Party Advisory)
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod (Third Party Advisory)
- https://github.com/Perl/perl5/compare/v5.30.2…v5.30.3 (Patch, Third Party Advisory)
- https://github.com/Perl/perl5/issues/16947 (Third Party Advisory)
- https://github.com/Perl/perl5/issues/17743 (Third Party Advisory)
- https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a (Patch, Third Party Advisory)
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
- https://security.gentoo.org/glsa/202006-03 (Third Party Advisory)