Skip Menu |
Report information
Id: 132606
Status: open
Priority: 0/
Queue: perl5

Owner: Nobody
Requestors: sraums2498 [at] gmail.com
Cc:
AdminCc:

Operating System: (no value)
PatchStatus: (no value)
Severity: (no value)
Type: (no value)
Perl Version: (no value)
Fixed In: (no value)



Subject: PERL-5.26.1 stack_overflow
From: SRAUMS JN <sraums2498 [...] gmail.com>
To: perl5-security-report [...] perl.org
Date: Tue, 19 Dec 2017 11:34:24 +0530
Download (untitled) / with headers
text/plain 28.3k

Message body is not shown because it is too large.

Download (untitled) / with headers
text/html 32.5k

Message body is not shown because it is too large.

Download 0_1
application/octet-stream 24.1k

Message body not shown because it is not plain text.

Subject: Re: [perl #132606] PERL-5.26.1 stack_overflow
From: Dave Mitchell <davem [...] iabyn.com>
To: perl5-security-report [...] perl.org
Date: Thu, 21 Dec 2017 14:58:35 +0000
Download (untitled) / with headers
text/plain 641b
On Mon, Dec 18, 2017 at 10:05:49PM -0800, SRAUMS JN wrote: Show quoted text
> # New Ticket Created by SRAUMS JN > # Please include the string: [perl #132606] > # in the subject line of all future correspondence about this issue. > # <URL: https://rt.perl.org/Ticket/Display.html?id=132606 > > > > ================================================================= > ==28140==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd403afe98
As Zefram said for a similar ticket: Not exploitable: overflowing the stack just causes segv. -- Lear: Dost thou call me fool, boy? Fool: All thy other titles thou hast given away; that thou wast born with.
RT-Send-CC: perl5-porters [...] perl.org
Download (untitled) / with headers
text/plain 633b
On Thu, 21 Dec 2017 06:58:45 -0800, davem wrote: Show quoted text
> On Mon, Dec 18, 2017 at 10:05:49PM -0800, SRAUMS JN wrote:
> > # New Ticket Created by SRAUMS JN > > # Please include the string: [perl #132606] > > # in the subject line of all future correspondence about this issue. > > # <URL: https://rt.perl.org/Ticket/Display.html?id=132606 > > > > > > > ================================================================= > > ==28140==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd403afe98
> > As Zefram said for a similar ticket: > > Not exploitable: overflowing the stack just causes segv.
Moved to the public queue. Tony


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

For issues related to this RT instance (aka "perlbug"), please contact perlbug-admin at perl.org