vulnerability

Red Hat: CVE-2020-12723: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jun 5, 2020
Added
Feb 4, 2021
Modified
Aug 11, 2025

Description

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-perlredhat-upgrade-perl-attribute-handlersredhat-upgrade-perl-coreredhat-upgrade-perl-cpanredhat-upgrade-perl-debuginforedhat-upgrade-perl-debugsourceredhat-upgrade-perl-develredhat-upgrade-perl-devel-peekredhat-upgrade-perl-devel-peek-debuginforedhat-upgrade-perl-devel-selfstubberredhat-upgrade-perl-errnoredhat-upgrade-perl-extutils-cbuilderredhat-upgrade-perl-extutils-embedredhat-upgrade-perl-extutils-installredhat-upgrade-perl-extutils-miniperlredhat-upgrade-perl-interpreterredhat-upgrade-perl-interpreter-debuginforedhat-upgrade-perl-ioredhat-upgrade-perl-io-debuginforedhat-upgrade-perl-io-zlibredhat-upgrade-perl-libnetcfgredhat-upgrade-perl-libsredhat-upgrade-perl-libs-debuginforedhat-upgrade-perl-locale-maketext-simpleredhat-upgrade-perl-macrosredhat-upgrade-perl-math-complexredhat-upgrade-perl-memoizeredhat-upgrade-perl-module-corelistredhat-upgrade-perl-module-loadedredhat-upgrade-perl-net-pingredhat-upgrade-perl-object-accessorredhat-upgrade-perl-openredhat-upgrade-perl-package-constantsredhat-upgrade-perl-pod-escapesredhat-upgrade-perl-pod-htmlredhat-upgrade-perl-selfloaderredhat-upgrade-perl-testredhat-upgrade-perl-testsredhat-upgrade-perl-time-pieceredhat-upgrade-perl-time-piece-debuginforedhat-upgrade-perl-utils
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.