USN-4602-2

Source
https://ubuntu.com/security/notices/USN-4602-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4602-2.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-4602-2
Upstream
Related
Published
2020-10-27T14:02:08.055103Z
Modified
2025-10-13T04:35:16Z
Summary
perl vulnerabilities
Details

USN-4602-1 fixed several vulnerabilities in Perl. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

ManhND discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-10543)

Hugo van der Sanden and Slaven Rezic discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-10878)

Sergey Aleynikov discovered that Perl incorrectly handled certain regular expressions. In environments where untrusted regular expressions are evaluated, a remote attacker could possibly use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-12723)

References

Affected packages

Ubuntu:Pro:14.04:LTS / perl

Package

Name
perl
Purl
pkg:deb/ubuntu/perl@5.18.2-2ubuntu1.7+esm3?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.18.2-2ubuntu1.7+esm3

Affected versions

5.*

5.14.2-21build1
5.18.1-4
5.18.1-4build1
5.18.1-5
5.18.2-2
5.18.2-2ubuntu1
5.18.2-2ubuntu1.1
5.18.2-2ubuntu1.3
5.18.2-2ubuntu1.4
5.18.2-2ubuntu1.6
5.18.2-2ubuntu1.7

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "libcgi-fast-perl"
        },
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "libperl-dev"
        },
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "libperl5.18"
        },
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "perl"
        },
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "perl-base"
        },
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "perl-debug"
        },
        {
            "binary_version": "5.18.2-2ubuntu1.7+esm3",
            "binary_name": "perl-modules"
        }
    ],
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-10543"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-10878"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2020-12723"
        }
    ]
}