Debian Bug report logs - #1056746
perl: CVE-2023-47038: Write past buffer end via illegal user-defined Unicode property

version graph

Package: perl; Maintainer for perl is Niko Tyni <ntyni@debian.org>; Source for perl is src:perl (PTS, buildd, popcon).

Reported by: Niko Tyni <ntyni@debian.org>

Date: Sat, 25 Nov 2023 20:21:01 UTC

Severity: important

Tags: bookworm, bullseye, fixed-upstream, patch, security, trixie

Found in version perl/5.30.0-1

Fixed in versions perl/5.36.0-10, perl/5.36.0-7+deb12u1, perl/5.38.2-1, perl/5.32.1-4+deb11u3

Done: Niko Tyni <ntyni@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org:
Bug#1056746; Package perl. (Sat, 25 Nov 2023 20:21:04 GMT) (full text, mbox, link).


Acknowledgement sent to Niko Tyni <ntyni@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org. (Sat, 25 Nov 2023 20:21:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Niko Tyni <ntyni@debian.org>
To: submit@bugs.debian.org
Subject: perl: CVE-2023-47038: Write past buffer end via illegal user-defined Unicode property
Date: Sat, 25 Nov 2023 22:17:18 +0200
Package: perl
Version: 5.30.0-1
Severity: important
Tags: security patch fixed-upstream bullseye bookworm trixie
X-Debbugs-Cc: team@security.debian.org

Perl upstream released 5.34.2, 5.36.2 and 5.38.1 today with coordinated
fixes for two security issues. One of these (CVE-2023-47039) is specific
to Windows, but the other one (CVE-2023-47038) concerns us.

We discussed this earlier with Salvatore from the security team and
decided that CVE-2023-47038 is non-DSA like other "crafted regular
expression crashes" we've handled in the past. It will hence be fixed
via point releases for stable and oldstable.

CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property

A test case is

  perl -e 'qr/\p{utf8::_perl_surrogate}/'

which crashes on oldstable (bullseye, 5.32), stable (bookworm, 5.36),
unstable / testing (5.36) and experimental (5.38).

The issue was introduced in the 5.30 cycle, so LTS (buster, 5.28) is
not affected.

The upstream fixes are at

  5.34 https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010
  5.36 https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6
  5.38 https://github.com/Perl/perl5/commit/92a9eb3d0d52ec7655c1beb29999a5a5219be664

The 5.34 fix applies to 5.32 as well.

I'll start with sid/trixie and handle the *stable updates after that,
mainly targeting next bookworm point update on 2023-12-09 as per

  https://lists.debian.org/debian-project/2023/11/msg00003.html

For experimental/5.38, I intend to push 5.38.1 instead of cherry
picking the patch.
-- 
Niko Tyni   ntyni@debian.org



Reply sent to Niko Tyni <ntyni@debian.org>:
You have taken responsibility. (Sat, 25 Nov 2023 22:09:03 GMT) (full text, mbox, link).


Notification sent to Niko Tyni <ntyni@debian.org>:
Bug acknowledged by developer. (Sat, 25 Nov 2023 22:09:03 GMT) (full text, mbox, link).


Message #10 received at 1056746-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1056746-close@bugs.debian.org
Subject: Bug#1056746: fixed in perl 5.36.0-10
Date: Sat, 25 Nov 2023 22:04:55 +0000
Source: perl
Source-Version: 5.36.0-10
Done: Niko Tyni <ntyni@debian.org>

We believe that the bug you reported is fixed in the latest version of
perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1056746@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Niko Tyni <ntyni@debian.org> (supplier of updated perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 25 Nov 2023 22:54:24 +0200
Source: perl
Architecture: source
Version: 5.36.0-10
Distribution: unstable
Urgency: medium
Maintainer: Niko Tyni <ntyni@debian.org>
Changed-By: Niko Tyni <ntyni@debian.org>
Closes: 1056746
Changes:
 perl (5.36.0-10) unstable; urgency=medium
 .
   * [SECURITY] CVE-2023-47039: Write past buffer end via illegal
     user-defined Unicode property. (Closes: #1056746)
Checksums-Sha1:
 28bf190aeb55dfece2a91005c04c46fe3733813d 2923 perl_5.36.0-10.dsc
 d4bca42a1e8d2794de792d0276b4575f5d2f8538 172148 perl_5.36.0-10.debian.tar.xz
 729322e1193b4ca307ef620574045c8f8b18fbf8 6242 perl_5.36.0-10_source.buildinfo
Checksums-Sha256:
 ab00058c9cc6a2fbb1e716f24257eab332422f5f575a0b0e0452db9f14d40975 2923 perl_5.36.0-10.dsc
 b14fb2e71fbc6a0310c6f5a4ec2a1fe88de4a6954532d45ae94578d51c56870b 172148 perl_5.36.0-10.debian.tar.xz
 d45c5f415d07137fb0eee13139755bc512db27a00fd20c09eed0e725f4a5ea3a 6242 perl_5.36.0-10_source.buildinfo
Files:
 e839c3745f8baa38952bd459b6920489 2923 perl standard perl_5.36.0-10.dsc
 64ff69c222010d43dffb4c246f328259 172148 perl standard perl_5.36.0-10.debian.tar.xz
 b8d92cfb432e2647671429639cdd1733 6242 perl standard perl_5.36.0-10_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=BscL
-----END PGP SIGNATURE-----




Reply sent to Niko Tyni <ntyni@debian.org>:
You have taken responsibility. (Wed, 29 Nov 2023 22:51:06 GMT) (full text, mbox, link).


Notification sent to Niko Tyni <ntyni@debian.org>:
Bug acknowledged by developer. (Wed, 29 Nov 2023 22:51:07 GMT) (full text, mbox, link).


Message #15 received at 1056746-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1056746-close@bugs.debian.org
Subject: Bug#1056746: fixed in perl 5.36.0-7+deb12u1
Date: Wed, 29 Nov 2023 22:47:08 +0000
Source: perl
Source-Version: 5.36.0-7+deb12u1
Done: Niko Tyni <ntyni@debian.org>

We believe that the bug you reported is fixed in the latest version of
perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1056746@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Niko Tyni <ntyni@debian.org> (supplier of updated perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 25 Nov 2023 22:59:54 +0200
Source: perl
Architecture: source
Version: 5.36.0-7+deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Niko Tyni <ntyni@debian.org>
Changed-By: Niko Tyni <ntyni@debian.org>
Closes: 1056746
Changes:
 perl (5.36.0-7+deb12u1) bookworm; urgency=medium
 .
   * [SECURITY] CVE-2023-47038: Write past buffer end via illegal
     user-defined Unicode property. (Closes: #1056746)
Checksums-Sha1:
 0da52776dc6cc0b31b1e6deb04539ad06ff5f94f 2918 perl_5.36.0-7+deb12u1.dsc
 7f59052b20e059d2fd0f89c95e27dd20fd7fc355 171136 perl_5.36.0-7+deb12u1.debian.tar.xz
 d1a5353e41b62db94adc57b062db04c38a831883 6270 perl_5.36.0-7+deb12u1_source.buildinfo
Checksums-Sha256:
 26ddac979ddb41229abc97b19fc2e97cdd840fe1a315e8f829ae1aeb0a1d05c5 2918 perl_5.36.0-7+deb12u1.dsc
 e5680de573f95b990cf995a7189c167281785cc49589c43874736e4b8b3c9e2f 171136 perl_5.36.0-7+deb12u1.debian.tar.xz
 58038ebd5511a4dc79d640f802b8e2a7c621228c3f4081ce79eed42e502a634d 6270 perl_5.36.0-7+deb12u1_source.buildinfo
Files:
 5e4e3995839e27e32231e005d817123a 2918 perl standard perl_5.36.0-7+deb12u1.dsc
 3489ac3a413030d41698911e79d911b4 171136 perl standard perl_5.36.0-7+deb12u1.debian.tar.xz
 f62855f19a8cefd21566484c331aded2 6270 perl standard perl_5.36.0-7+deb12u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=oi9P
-----END PGP SIGNATURE-----




Reply sent to Niko Tyni <ntyni@debian.org>:
You have taken responsibility. (Thu, 30 Nov 2023 20:57:08 GMT) (full text, mbox, link).


Notification sent to Niko Tyni <ntyni@debian.org>:
Bug acknowledged by developer. (Thu, 30 Nov 2023 20:57:08 GMT) (full text, mbox, link).


Message #20 received at 1056746-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1056746-close@bugs.debian.org
Subject: Bug#1056746: fixed in perl 5.38.2-1
Date: Thu, 30 Nov 2023 20:52:39 +0000
Source: perl
Source-Version: 5.38.2-1
Done: Niko Tyni <ntyni@debian.org>

We believe that the bug you reported is fixed in the latest version of
perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1056746@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Niko Tyni <ntyni@debian.org> (supplier of updated perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 30 Nov 2023 20:28:47 +0200
Source: perl
Architecture: source
Version: 5.38.2-1
Distribution: experimental
Urgency: medium
Maintainer: Niko Tyni <ntyni@debian.org>
Changed-By: Niko Tyni <ntyni@debian.org>
Closes: 1051427 1055109 1056746
Changes:
 perl (5.38.2-1) experimental; urgency=medium
 .
   * Update to new upstream version 5.38.2.
     + [SECURITY] CVE-2023-47038: Write past buffer end via illegal
       user-defined Unicode property. (Closes: #1056746)
   * Restore optimization level of op.c and opmini.c on hppa and sh4.
     Many thanks to John David Anglin. (Closes: #1055109)
   * Build depend on libc6-dev (>= 2.37-8) on ppc64el for correct F_GETLK
     et al. (See  #1050592)
   * Explicitly do not use strlcpy and strlcat from glibc 2.38 to keep
     libperl5.38 symbols stable. (Closes: #1051427)
Checksums-Sha1:
 d808207fdbb42f594fe3f25b42cf0535944e5ba6 2933 perl_5.38.2-1.dsc
 0b5d76399e77b21ce892cd38f4a63703628ce896 418808 perl_5.38.2.orig-regen-configure.tar.xz
 af1d5f9e0499f3cfa4736433631aebf7624714da 13679524 perl_5.38.2.orig.tar.xz
 ccea4d87c1506daebe673c7e39aaf640de07465e 165496 perl_5.38.2-1.debian.tar.xz
 261a5bb3fa46820f2b2b61607646d9a6a6e038dc 6238 perl_5.38.2-1_source.buildinfo
Checksums-Sha256:
 4603d34507fe493fd4f549c409e97113f226631d8b052e6dfabdb862e156b751 2933 perl_5.38.2-1.dsc
 4d1b34cc058f9963cb89785ecc040d57f6d7725cd83329cfa4ef8b27566454d2 418808 perl_5.38.2.orig-regen-configure.tar.xz
 d91115e90b896520e83d4de6b52f8254ef2b70a8d545ffab33200ea9f1cf29e8 13679524 perl_5.38.2.orig.tar.xz
 d0757268043ecd9424ad2bd16eece8a12482fc0bf74cc6f4ad1cab5e3febc87b 165496 perl_5.38.2-1.debian.tar.xz
 5c42c25041de4a46623236500b7e07a11e4519e491ca883cffb437f1593a3e03 6238 perl_5.38.2-1_source.buildinfo
Files:
 ba5878793f7cc1c878e2a4d76382bca9 2933 perl standard perl_5.38.2-1.dsc
 139d4ab28a90409790d01ec7a38b6858 418808 perl standard perl_5.38.2.orig-regen-configure.tar.xz
 d3957d75042918a23ec0abac4a2b7e0a 13679524 perl standard perl_5.38.2.orig.tar.xz
 56630ee7524b9b73b86c192ca9f2dbf7 165496 perl standard perl_5.38.2-1.debian.tar.xz
 90be53110b5a5822dfc0b35cfa800f15 6238 perl standard perl_5.38.2-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJFBAEBCgAvFiEEdqKOQsmBHZHoj7peLsD/s7cwGx8FAmVo1KoRHG50eW5pQGRl
Ymlhbi5vcmcACgkQLsD/s7cwGx+KOBAAti0QN6RdToOgGzGxQ8lTObfItVRobdkR
l/wXsBObf+RpwLkOE5h8TZq/q+OwzAIkA/inu9z/q+67v99YxqdTnyEvrON5X2LX
rKH/NKsBDGjLNdxWpn3WqMDAbt3Eqr4WKr0nOgHXlWWOOV7OLnYJ5nacKlDwG94T
BJmYLdmcVd9aTquPVaRt0Kcyd56uA0crQ01tN9TzlXXS7BA62/1McseFwqfotNpA
tzSxAUmt1ZF8WqUFchCWcFq4v/EcOA1PNF7vnUzVMtiztX8j4eSpyrmbTKOhyYxu
k5eQujQZLcvMQnmG7B+IWKmaUqtdqO2lpgUuNY4lh6tWl6GD3J4bmBfcMEPnyjoa
zG6fY8yCPklt0FX42rRHAu4iNuBe7aaAXPoo6rmBSDFPg6cdtbUc5VaZqNY0Hz+B
Y4O/0pe8nr2CTx625MYjl7ZbbtTdWOxb349lx6PyYnaD6Sl5qnCHgIn0xAe+WLJp
BzaCA3vCW4RL29meewrgdy1gfhQq/QIvk2AutzhZZin5PH+T8zJDkkuGLvYWvDY9
Fw3fHmiWO06z4Q02Kh6PTKmqP6o0pYzIgkcSgp52YrTSARrApqtFACTmc3TeLp8t
nGNnadQPd79EfG7JCduMhRcY8Q+AntoXcWCb6+GAGQPd4nz5RW0pzP3s8xLKt/ne
PiWg+WtNpRY=
=+pJi
-----END PGP SIGNATURE-----




Reply sent to Niko Tyni <ntyni@debian.org>:
You have taken responsibility. (Mon, 18 Dec 2023 18:33:31 GMT) (full text, mbox, link).


Notification sent to Niko Tyni <ntyni@debian.org>:
Bug acknowledged by developer. (Mon, 18 Dec 2023 18:33:31 GMT) (full text, mbox, link).


Message #25 received at 1056746-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1056746-close@bugs.debian.org
Subject: Bug#1056746: fixed in perl 5.32.1-4+deb11u3
Date: Mon, 18 Dec 2023 18:32:45 +0000
Source: perl
Source-Version: 5.32.1-4+deb11u3
Done: Niko Tyni <ntyni@debian.org>

We believe that the bug you reported is fixed in the latest version of
perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1056746@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Niko Tyni <ntyni@debian.org> (supplier of updated perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 25 Nov 2023 23:03:14 +0200
Source: perl
Architecture: source
Version: 5.32.1-4+deb11u3
Distribution: bullseye
Urgency: medium
Maintainer: Niko Tyni <ntyni@debian.org>
Changed-By: Niko Tyni <ntyni@debian.org>
Closes: 1056746
Changes:
 perl (5.32.1-4+deb11u3) bullseye; urgency=medium
 .
   * [SECURITY] CVE-2023-47038: Write past buffer end via illegal
     user-defined Unicode property. (Closes: #1056746)
Checksums-Sha1:
 39a611fa4ceaf00ab4f805dbc3917baab5723446 2918 perl_5.32.1-4+deb11u3.dsc
 335383a549989bcc89b727b7ab6731e5e03425b3 167388 perl_5.32.1-4+deb11u3.debian.tar.xz
 f9eb23047178f2c0797b7c7ea829d6e49dc9694d 6270 perl_5.32.1-4+deb11u3_source.buildinfo
Checksums-Sha256:
 75699317b7e2865de39e86fb53f630669fd6e5904c8526699e8a01af98d56e6d 2918 perl_5.32.1-4+deb11u3.dsc
 a875b28e158180906d77df06dea08b8e724f91b31249fe7d205fc3f2cb520ddf 167388 perl_5.32.1-4+deb11u3.debian.tar.xz
 fd60dc97113bab88fc091c5be58273ef0241a7d728523380d93b6b9b0d836793 6270 perl_5.32.1-4+deb11u3_source.buildinfo
Files:
 9c03a8f7f3ef27d2580759d398b07a2d 2918 perl standard perl_5.32.1-4+deb11u3.dsc
 741773ddb9b9d629e197e4d81c3f4f9f 167388 perl standard perl_5.32.1-4+deb11u3.debian.tar.xz
 423c9fa8bdd73ac889d5bc3fa9e7e9db 6270 perl standard perl_5.32.1-4+deb11u3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=AGz9
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 11 Feb 2024 07:27:41 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Thu Aug 1 23:37:33 2024; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.