File _patchinfo of Package patchinfo.15355
<patchinfo incident="15355">
<issue tracker="bnc" id="1171866">VUL-0: CVE-2020-12723: perl: corruption of the intermediate language state of a compiled regular expression</issue>
<issue tracker="bnc" id="1171863">VUL-0: CVE-2020-10543: perl: heap buffer overflow in regular expression compiler which overwrites memory allocated with attacker's data</issue>
<issue tracker="bnc" id="1172348">L3-Question: Perl warning: _FORTIFY_SOURCE requires compiling with optimization (-O)</issue>
<issue tracker="bnc" id="1171864">VUL-0: CVE-2020-10878: perl: integer overflows may allow an attacker to insert instructions into the compiled form of a Perl regular expression</issue>
<issue tracker="cve" id="2020-10543"/>
<issue tracker="cve" id="2020-12723"/>
<issue tracker="cve" id="2020-10878"/>
<packager>mlschroe</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for perl</summary>
<description>This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have
allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of
instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a
compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
</description>
</patchinfo>