CVE-2017-12883

Priority
Medium
Description
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5
before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to
disclose sensitive information or cause a denial of service (application
crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
References
Bugs
Package
Source: perl (LP Ubuntu Debian)
Upstream:released (5.26.0-8)
Ubuntu 17.10 (Artful Aardvark):not-affected (5.26.0-8ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 17.04 (Zesty Zapus):needed
Patches:
Upstream:https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f
More Information

Updated: 2017-10-17 19:14:33 UTC (commit 13537)