{
  "threat_severity" : "Moderate",
  "public_date" : "2020-06-02T00:00:00Z",
  "bugzilla" : {
    "description" : "perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS",
    "id" : "1837988",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1837988"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.6",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-190->CWE-185",
  "details" : [ "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection." ],
  "statement" : "This flaw is an integer overflow triggered when an application compiles a specially crafted, untrusted regular expression pattern supplied by a user, as most applications match untrusted data against a trusted regex pattern.The flaw leads to a corruption of the intermediate language state. While this could theoretically allow an attacker to insert instructions, the resulting behavior is unpredictable, and any potential code execution is likely outside of an attacker's reliable control. Therefore, the most probable and practical impact is an application crash, resulting in a Denial of Service (DoS).",
  "acknowledgement" : "Red Hat would like to thank Hugo van der Sanden and Slaven Rezic for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2021-02-02T00:00:00Z",
    "advisory" : "RHSA-2021:0343",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "perl-4:5.16.3-299.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.4 Advanced Update Support",
    "release_date" : "2021-04-20T00:00:00Z",
    "advisory" : "RHSA-2021:1266",
    "cpe" : "cpe:/o:redhat:rhel_aus:7.4",
    "package" : "perl-4:5.16.3-292.el7_4.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.4 Telco Extended Update Support",
    "release_date" : "2021-04-20T00:00:00Z",
    "advisory" : "RHSA-2021:1266",
    "cpe" : "cpe:/o:redhat:rhel_tus:7.4",
    "package" : "perl-4:5.16.3-292.el7_4.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions",
    "release_date" : "2021-04-20T00:00:00Z",
    "advisory" : "RHSA-2021:1266",
    "cpe" : "cpe:/o:redhat:rhel_e4s:7.4",
    "package" : "perl-4:5.16.3-292.el7_4.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.6 Extended Update Support",
    "release_date" : "2021-03-16T00:00:00Z",
    "advisory" : "RHSA-2021:0883",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.6",
    "package" : "perl-4:5.16.3-294.el7_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.7 Extended Update Support",
    "release_date" : "2021-03-30T00:00:00Z",
    "advisory" : "RHSA-2021:1032",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.7",
    "package" : "perl-4:5.16.3-294.el7_7.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-05-18T00:00:00Z",
    "advisory" : "RHSA-2021:1678",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "perl-4:5.26.3-419.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2021-05-18T00:00:00Z",
    "advisory" : "RHSA-2021:1678",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "perl-4:5.26.3-419.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2021-07-20T00:00:00Z",
    "advisory" : "RHSA-2021:2792",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.2",
    "package" : "perl-4:5.26.3-418.el8_2.1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Out of support scope",
    "package_name" : "perl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "perl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "perl:5.24/perl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-10878\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-10878" ],
  "name" : "CVE-2020-10878",
  "mitigation" : {
    "value" : "To mitigate this flaw, developers should not allow untrusted regular expressions to be compiled by the Perl regular expression compiler.",
    "lang" : "en:us"
  },
  "csaw" : false
}