Revision Date: | 2020-06-19 | Version: | 1 |
Title: | Security update for perl (Important) |
Description: |
This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have allowed overwriting of allocated memory with attacker's data (bsc#1171863). - CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of instructions into the compiled form of Perl regular expression (bsc#1171864). - CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a compiled regular expression (bsc#1171866). - Fixed a bad warning in features.ph (bsc#1172348).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1171863 1171864 1171866 1172348 CVE-2020-10543 CVE-2020-10878 CVE-2020-12723 SUSE-SU-2020:1682-1
|
Platform(s): | SUSE Linux Enterprise Desktop 15 SP1 SUSE Linux Enterprise High Performance Computing 15 SP1 SUSE Linux Enterprise Module for Basesystem 15 SP1 SUSE Linux Enterprise Server 15 SP1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 SUSE Linux Enterprise Storage 6 SUSE Manager Proxy 4.0 SUSE Manager Server 4.0
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Basesystem 15 SP1 is installed AND Package Information
perl-5.26.1-7.12.1 is installed
OR perl-base-5.26.1-7.12.1 is installed
OR perl-base-32bit-5.26.1-7.12.1 is installed
|