Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Netapp
Subscribe
|
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
|
Oracle
Subscribe
|
Communications Billing And Revenue Management
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Eagle Application Processor
Subscribe
Communications Eagle Lnp Application Processor
Subscribe
Communications Lsms
Subscribe
Communications Offline Mediation Controller
Subscribe
Communications Performance Intelligence Center
Subscribe
Communications Pricing Design Center
Subscribe
Configuration Manager
Subscribe
Enterprise Manager Base Platform
Subscribe
Sd-wan Aware
Subscribe
Tekelec Platform Distribution
Subscribe
|
|
Perl
Subscribe
|
Perl
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-3284 | Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. |
Ubuntu USN |
USN-4602-1 | Perl vulnerabilities |
Ubuntu USN |
USN-4602-2 | Perl vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:14:15.674Z
Reserved: 2020-03-23T00:00:00
Link: CVE-2020-10878
No data.
Status : Modified
Published: 2020-06-05T14:15:10.527
Modified: 2024-11-21T04:56:16.367
Link: CVE-2020-10878
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN