MGASA-2016-0191

Source
https://advisories.mageia.org/MGASA-2016-0191.html
Import Source
https://advisories.mageia.org/MGASA-2016-0191.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0191
Related
Published
2016-05-20T11:38:30Z
Modified
2016-05-20T11:30:27Z
Summary
Updated perl packages fix security vulnerability
Details

The regex engine got into an infinite loop because of the malformation. It is trying to back-up over a sequence of UTF-8 continuation bytes. The character just before the sequence should be a start byte. If it's not, there is a malformation which results in "hang" of regexp matching and CPU exhaustion (CVE-2015-8853).

References
Credits

Affected packages

Mageia:5 / perl

Package

Name
perl
Purl
pkg:rpm/mageia/perl?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.20.1-8.3.mga5

Ecosystem specific

{
    "section": "core"
}