ALT-PU-2015-2178-1
Closed vulnerabilities
BDU:2016-02231
Уязвимость интерпретатора Perl, позволяющая нарушителю внедрить произвольный код
BDU:2022-02611
Уязвимость функции decode_xs интерпретатора языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02612
Уязвимость функции bsd_glob интерпретатора языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02626
Уязвимость функции _compile интерпретатора языка программирования Perl , позволяющая нарушителю выполнять произвольные команды
BDU:2022-02638
Уязвимость функции хеширования интерпретатора языка программирования Perl, позволяющая нарушителю вызывать отказ в обслуживании
Modified: 2024-11-21
CVE-2011-1487
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
- FEDORA-2011-4610
- FEDORA-2011-4631
- SUSE-SR:2011:009
- [oss-security] 20110401 CVE Request -- perl -- lc(), uc() routines are laundering tainted data
- [oss-security] 20110404 Re: CVE Request -- perl -- lc(), uc() routines are laundering tainted data
- http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99
- http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336
- 43921
- 44168
- DSA-2265
- MDVSA-2011:091
- 47124
- https://bugzilla.redhat.com/show_bug.cgi?id=692844
- https://bugzilla.redhat.com/show_bug.cgi?id=692898
- perl-laundering-security-bypass(66528)
- FEDORA-2011-4610
- perl-laundering-security-bypass(66528)
- https://bugzilla.redhat.com/show_bug.cgi?id=692898
- https://bugzilla.redhat.com/show_bug.cgi?id=692844
- 47124
- MDVSA-2011:091
- DSA-2265
- 44168
- 43921
- http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336
- http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99
- [oss-security] 20110404 Re: CVE Request -- perl -- lc(), uc() routines are laundering tainted data
- [oss-security] 20110401 CVE Request -- perl -- lc(), uc() routines are laundering tainted data
- SUSE-SR:2011:009
- FEDORA-2011-4631
Modified: 2024-11-21
CVE-2011-2728
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
- http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
- FEDORA-2011-15484
- http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77
- 46172
- 49858
- https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1
- https://bugzilla.redhat.com/show_bug.cgi?id=742987
- http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
- https://bugzilla.redhat.com/show_bug.cgi?id=742987
- https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1
- 49858
- 46172
- http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77
- FEDORA-2011-15484
Modified: 2024-11-21
CVE-2011-2939
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
- http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
- http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5
- http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29
- 46172
- 46989
- 51457
- 55314
- MDVSA-2012:008
- [oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string
- [oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string
- RHSA-2011:1424
- 49858
- USN-1643-1
- https://bugzilla.redhat.com/show_bug.cgi?id=731246
- http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
- https://bugzilla.redhat.com/show_bug.cgi?id=731246
- USN-1643-1
- 49858
- RHSA-2011:1424
- [oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string
- [oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string
- MDVSA-2012:008
- 55314
- 51457
- 46989
- 46172
- http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29
- http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5
Modified: 2024-11-21
CVE-2012-5195
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44
- http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44
- RHSA-2013:0685
- RHSA-2013:0685
- 51457
- 51457
- 55314
- 55314
- DSA-2586
- DSA-2586
- MDVSA-2013:113
- MDVSA-2013:113
- [perl.perl5.porters] 20121010 maint-5.12, maint-5.14, and CVE-2012-5195
- [perl.perl5.porters] 20121010 maint-5.12, maint-5.14, and CVE-2012-5195
- [oss-security] 20121026 Medium severity flaw with Perl 5
- [oss-security] 20121026 Medium severity flaw with Perl 5
- [oss-security] 20121027 Re: Medium severity flaw with Perl 5
- [oss-security] 20121027 Re: Medium severity flaw with Perl 5
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 56287
- 56287
- USN-1643-1
- USN-1643-1
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352
Modified: 2024-11-21
CVE-2012-6329
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224
- [perl5-porters] 20121205 security notice: Locale::Maketext
- [perl5-porters] 20121205 security notice: Locale::Maketext
- [perl5-porters] 20121205 Re: security notice: Locale::Maketext
- [perl5-porters] 20121205 Re: security notice: Locale::Maketext
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- [oss-security] 20121211 Re: CVE request: perl-modules
- [oss-security] 20121211 Re: CVE request: perl-modules
- http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod
- http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod
- http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8
- http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8
- RHSA-2013:0685
- RHSA-2013:0685
- [foswiki-announce] 20121212 Security Alert CVE-2012-6329: Foswiki MAKETEXT Variable Allows Arbitrary Shell Command Execution
- [foswiki-announce] 20121212 Security Alert CVE-2012-6329: Foswiki MAKETEXT Variable Allows Arbitrary Shell Command Execution
- http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329
- http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329
- MDVSA-2013:113
- MDVSA-2013:113
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 56950
- 56950
- USN-2099-1
- USN-2099-1
- https://bugzilla.redhat.com/show_bug.cgi?id=884354
- https://bugzilla.redhat.com/show_bug.cgi?id=884354
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032
Modified: 2024-11-21
CVE-2013-1667
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- APPLE-SA-2013-10-22-3
- APPLE-SA-2013-10-22-3
- HPSBUX02928
- HPSBUX02928
- SSRT101274
- SSRT101274
- 90892
- 90892
- http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5
- http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5
- http://perl5.git.perl.org/perl.git/commitdiff/9d83adc
- http://perl5.git.perl.org/perl.git/commitdiff/9d83adc
- http://perl5.git.perl.org/perl.git/commitdiff/d59e31f
- http://perl5.git.perl.org/perl.git/commitdiff/d59e31f
- RHSA-2013:0685
- RHSA-2013:0685
- 52472
- 52472
- 52499
- 52499
- DSA-2641
- DSA-2641
- MDVSA-2013:113
- MDVSA-2013:113
- [perl.perl5.porters] 20130304 CVE-2013-1667: important rehashing flaw
- [perl.perl5.porters] 20130304 CVE-2013-1667: important rehashing flaw
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 58311
- 58311
- USN-1770-1
- USN-1770-1
- https://bugzilla.redhat.com/show_bug.cgi?id=912276
- https://bugzilla.redhat.com/show_bug.cgi?id=912276
- perl-rehash-dos(82598)
- perl-rehash-dos(82598)
- oval:org.mitre.oval:def:18771
- oval:org.mitre.oval:def:18771
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094