Security update for perl
Announcement ID: | SUSE-SU-2020:1682-2 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has one security fix can now be installed.
Description:
This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Package Hub 15 15-SP1
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1682=1
Package List:
-
SUSE Package Hub 15 15-SP1 (x86_64)
- perl-32bit-5.26.1-7.12.1
- perl-32bit-debuginfo-5.26.1-7.12.1
- perl-debugsource-5.26.1-7.12.1
References:
- https://www.suse.com/security/cve/CVE-2020-10543.html
- https://www.suse.com/security/cve/CVE-2020-10878.html
- https://www.suse.com/security/cve/CVE-2020-12723.html
- https://bugzilla.suse.com/show_bug.cgi?id=1171863
- https://bugzilla.suse.com/show_bug.cgi?id=1171864
- https://bugzilla.suse.com/show_bug.cgi?id=1171866
- https://bugzilla.suse.com/show_bug.cgi?id=1172348