CVE-2017-20230

NameCVE-2017-20230
DescriptionStorable versions before 3.05 for Perl has a stack overflow. The retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
perl (PTS)bullseye5.32.1-4+deb11u3fixed
bullseye (security)5.32.1-4+deb11u5fixed
bookworm5.36.0-7+deb12u3fixed
bookworm (security)5.36.0-7+deb12u2fixed
trixie5.40.1-6fixed
forky, sid5.40.1-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libstorable-perlsource(unstable)(unfixed)
perlsource(unstable)5.28.0-3

Notes

https://lists.security.metacpan.org/cve-announce/msg/39144694/
https://github.com/Perl/perl5/issues/15831
https://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216 (v5.27.9)

Search for package or bug name: Reporting problems