An update for perl is now available for openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1926
Final
1.0
1.0
2023-12-15
Initial
2023-12-15
2023-12-15
openEuler SA Tool V1.0
2023-12-15
perl security update
An update for perl is now available for openEuler-22.03-LTS-SP2.
Perl 5 is a highly capable, feature-rich programming language with over 30 years of development. Perl 5 runs on over 100 platforms from portables to mainframes and is suitable for both rapid prototyping and large scale development projects.
Security Fix(es):
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.(CVE-2023-47100)
An update for perl is now available for openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
perl
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1926
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-47100
https://nvd.nist.gov/vuln/detail/CVE-2023-47100
openEuler-22.03-LTS-SP2
perl-devel-5.34.0-13.oe2203sp2.aarch64.rpm
perl-debugsource-5.34.0-13.oe2203sp2.aarch64.rpm
perl-libs-5.34.0-13.oe2203sp2.aarch64.rpm
perl-5.34.0-13.oe2203sp2.aarch64.rpm
perl-debuginfo-5.34.0-13.oe2203sp2.aarch64.rpm
perl-help-5.34.0-13.oe2203sp2.noarch.rpm
perl-5.34.0-13.oe2203sp2.src.rpm
perl-libs-5.34.0-13.oe2203sp2.x86_64.rpm
perl-devel-5.34.0-13.oe2203sp2.x86_64.rpm
perl-5.34.0-13.oe2203sp2.x86_64.rpm
perl-debuginfo-5.34.0-13.oe2203sp2.x86_64.rpm
perl-debugsource-5.34.0-13.oe2203sp2.x86_64.rpm
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
2023-12-15
CVE-2023-47100
openEuler-22.03-LTS-SP2
Critical
9.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
perl security update
2023-12-15
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1926