CVE-2018-18311: Perl Buffer Overflow
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Mawrer Amed Ramirez Martinez |
Bug Description
Title
-----
CVE-2018-18311: Perl Buffer Overflow
Brief Description
-----------------
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
+------
| CVE-2018-18311 | |
+------
| Max Score | 9.8 CRITICAL (nvd) |
| nvd | 9.8/CVSS:
| redhat | 8.1/CVSS:
| nvd | 7.5/AV:
| Summary | Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted |
| | regular expression that triggers invalid write operations. |
| CWE | CWE-190: Integer Overflow or Wraparound (redhat) |
| CWE | CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| | (redhat) |
| CWE | CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer |
| | (nvd) |
| Affected Pkg | perl-4:
| Affected Pkg | perl-Pod-
| Affected Pkg | perl-libs-
| Affected Pkg | perl-macros-
| Confidence | 100 / OvalMatch |
| Source | https:/
| CVSSv2 Calc | https:/
| CVSSv3 Calc | https:/
| RHEL-CVE | https:/
| CWE | https:/
| CWE | https:/
| CWE | https:/
+------
Severity
--------
<Major: System/Feature is usable but degraded>
Steps to Reproduce
------------------
N/A
Expected Behavior
------------------
N/A
Actual Behavior
----------------
N/A
Reproducibility
---------------
N/A
System Configuration
-------
N/A
Branch/Pull Time/Commit
-------
N/A
Timestamp/Logs
--------------
N/A
CVE References
information type: | Public → Private Security |
Changed in starlingx: | |
importance: | Undecided → High |
tags: | added: stx.2019.05 stx.security |
Changed in starlingx: | |
assignee: | nobody → Cesar Lara (clara1) |
Changed in starlingx: | |
status: | New → Triaged |
tags: | added: stx.build |
tags: |
added: stx.2.0 removed: stx.2019.05 |
Changed in starlingx: | |
assignee: | Cesar Lara (clara1) → Mawrer Amed Ramirez Martinez (marami3) |
Changed in starlingx: | |
status: | Triaged → Fix Released |
information type: | Private Security → Public |
This is the patch that fix it. We might need to rebase. Whoever is going to
be on charge of fix it, this is a good hint
https:/ /github. com/Perl/ perl5/commit/ 34716e2a6ee2af9 6078d62b065b778 5c001194be
:)
On Mon, Mar 18, 2019, 17:50 Bruce Jones <email address hidden> wrote:
> ** Changed in: starlingx /bugs.launchpad .net/bugs/ 1820757 ------- ---+--- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- --+ ------- ---+--- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- --+ 3.0/AV: N/AC:L/ PR:N/UI: N/S:U/C: H/I:H/A: H 3.0/AV: N/AC:H/ PR:N/UI: N/S:U/C: H/I:H/A: H N/AC:L/ Au:N/C: P/I:P/A: P HIGH 5.16.3- 293.el7 -> 4:5.16.3-294.el7_6 Escapes- 1:1.04- 293.el7 -> 1:1.04-294.el7_6 4:5.16. 3-293.el7 -> 4:5.16.3-294.el7_6 4:5.16. 3-293.el7 -> 4:5.16.3-294.el7_6 /nvd.nist. gov/vuln/ detail/ CVE-2018- 18311 /nvd.nist. gov/vuln- metrics/ cvss/v2- calculator? name=CVE- 2018-18311 /nvd.nist. gov/vuln- metrics/ cvss/v3- calculator? name=CVE- 2018-18311 /access. redhat. com/security/ cve/CVE- 2018-18311 /cwe.mitre. org/data/ definitions/ CWE-190. html
> Assignee: (unassigned) => Cesar Lara (clara1)
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https:/
>
> Title:
> CVE-2018-18311: Perl Buffer Overflow
>
> Status in StarlingX:
> New
>
> Bug description:
> Title
> -----
> CVE-2018-18311: Perl Buffer Overflow
>
> Brief Description
> -----------------
> Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a
> crafted regular expression that triggers invalid write operations.
>
>
> +------
> | CVE-2018-18311 |
> |
>
> +------
> | Max Score | 9.8 CRITICAL (nvd)
> |
> | nvd | 9.8/CVSS:
> CRITICAL |
> | redhat | 8.1/CVSS:
> IMPORTANT |
> | nvd | 7.5/AV:
> |
> | Summary | Perl before 5.26.3 and 5.28.x before 5.28.1 has a
> buffer overflow via a crafted |
> | | regular expression that triggers invalid write
> operations. |
> | CWE | CWE-190: Integer Overflow or Wraparound (redhat)
> |
> | CWE | CWE-120: Buffer Copy without Checking Size of Input
> ('Classic Buffer Overflow') |
> | | (redhat)
> |
> | CWE | CWE-119: Improper Restriction of Operations within
> the Bounds of a Memory Buffer |
> | | (nvd)
> |
> | Affected Pkg | perl-4:
> (updates) |
> | Affected Pkg | perl-Pod-
> (updates) |
> | Affected Pkg | perl-libs-
> (updates) |
> | Affected Pkg | perl-macros-
> (updates) |
> | Confidence | 100 / OvalMatch
> |
> | Source | https:/
> |
> | CVSSv2 Calc |
> https:/
> |
> | CVSSv3 Calc |
> https:/
> |
> | RHEL-CVE | https:/
> |
> | CWE | https:/
> |
...