vulnerability
Red Hat: CVE-2020-10543: heap-based buffer overflow in regular expression compiler leads to DoS (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:N/I:P/A:P) | 2020-06-05 | 2021-02-04 | 2023-12-15 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Published
2020-06-05
Added
2021-02-04
Modified
2023-12-15
Description
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
Solution(s)
redhat-upgrade-perlredhat-upgrade-perl-attribute-handlersredhat-upgrade-perl-coreredhat-upgrade-perl-cpanredhat-upgrade-perl-debuginforedhat-upgrade-perl-debugsourceredhat-upgrade-perl-develredhat-upgrade-perl-devel-peekredhat-upgrade-perl-devel-peek-debuginforedhat-upgrade-perl-devel-selfstubberredhat-upgrade-perl-errnoredhat-upgrade-perl-extutils-cbuilderredhat-upgrade-perl-extutils-embedredhat-upgrade-perl-extutils-installredhat-upgrade-perl-extutils-miniperlredhat-upgrade-perl-interpreterredhat-upgrade-perl-interpreter-debuginforedhat-upgrade-perl-ioredhat-upgrade-perl-io-debuginforedhat-upgrade-perl-io-zlibredhat-upgrade-perl-libnetcfgredhat-upgrade-perl-libsredhat-upgrade-perl-libs-debuginforedhat-upgrade-perl-locale-maketext-simpleredhat-upgrade-perl-macrosredhat-upgrade-perl-math-complexredhat-upgrade-perl-memoizeredhat-upgrade-perl-module-corelistredhat-upgrade-perl-module-loadedredhat-upgrade-perl-net-pingredhat-upgrade-perl-object-accessorredhat-upgrade-perl-openredhat-upgrade-perl-package-constantsredhat-upgrade-perl-pod-escapesredhat-upgrade-perl-pod-htmlredhat-upgrade-perl-selfloaderredhat-upgrade-perl-testredhat-upgrade-perl-testsredhat-upgrade-perl-time-pieceredhat-upgrade-perl-time-piece-debuginforedhat-upgrade-perl-utils

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.