{"id":"CVE-2020-10878","details":"Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.","modified":"2026-04-16T04:39:57.136360083Z","published":"2020-06-05T14:15:10.527Z","related":["SUSE-SU-2020:1662-1","SUSE-SU-2020:1682-1","SUSE-SU-2020:1682-2","openSUSE-SU-2020:0850-1","openSUSE-SU-2024:11158-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html"},{"type":"ADVISORY","url":"https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202006-03"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200611-0001/"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8"},{"type":"FIX","url":"https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/Perl/perl5","events":[{"introduced":"0"},{"fixed":"65ddc30325817c6cd4df6ca1d4a1af2383875c3f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.30.3"}]}},{"type":"GIT","repo":"https://github.com/perl/perl5","events":[{"introduced":"0"},{"fixed":"0a320d753fe7fca03df259a4dfd8e641e51edaa8"},{"fixed":"3295b48defa0f8570114877b063fe546dd348b3c"}]}],"versions":["GitLive-blead","if-0.0603","if-0.0604","if-0.0605","perl-1.0","perl-2.0","perl-3.000","perl-3.044","perl-4.0.00","perl-4.0.36","perl-5.000","perl-5.000o","perl-5.001","perl-5.001n","perl-5.002","perl-5.002_01","perl-5.003","perl-5.005","perl-5.6.0","perl-5.7.0","perl-5.7.1","perl-5.7.2","perl-5.7.3","perl-5.8.0","perl-5.9.0","perl-5.9.1","perl-5.9.2","perl-5.9.3","perl-5.9.4","perl-5.9.5","perl-5a2","perl-5a9","v5.10.0","v5.11.0","v5.11.1","v5.11.3","v5.11.4","v5.11.5","v5.12.0","v5.12.0-RC0","v5.12.0-RC1","v5.12.0-RC2","v5.12.0-RC3","v5.12.0-RC4","v5.12.0-RC5","v5.13.0","v5.13.1","v5.13.10","v5.13.11","v5.13.2","v5.13.3","v5.13.4","v5.13.5","v5.13.6","v5.13.7","v5.13.8","v5.13.9","v5.14.0","v5.14.0-RC1","v5.14.0-RC2","v5.14.0-RC3","v5.15.0","v5.15.1","v5.15.2","v5.15.3","v5.15.4","v5.15.5","v5.15.9","v5.16.0","v5.16.0-RC1","v5.16.0-RC2","v5.17.0","v5.17.2","v5.17.4","v5.17.6","v5.17.7","v5.17.7.0","v5.17.8","v5.17.9","v5.18.0","v5.18.0-RC1","v5.18.0-RC2","v5.18.0-RC3","v5.18.0-RC4","v5.19.0","v5.19.1","v5.19.11","v5.19.2","v5.19.3","v5.19.5","v5.19.7","v5.20.0","v5.20.0-RC1","v5.21.0","v5.21.1","v5.21.10","v5.21.11","v5.21.4","v5.21.5","v5.21.6","v5.21.8","v5.21.9","v5.22.0","v5.22.0-RC1","v5.22.0-RC2","v5.23.0","v5.23.1","v5.23.2","v5.23.3","v5.23.4","v5.23.6","v5.23.7","v5.24.0","v5.24.0-RC1","v5.24.0-RC2","v5.24.0-RC3","v5.24.0-RC4","v5.24.0-RC5","v5.25.0","v5.25.11","v5.25.2","v5.25.3","v5.25.4","v5.25.5","v5.25.7","v5.25.9","v5.26.0","v5.26.0-RC2","v5.27.0","v5.27.10","v5.27.11","v5.27.3","v5.27.5","v5.27.6","v5.27.7","v5.27.8","v5.28.0","v5.28.0-RC1","v5.28.0-RC2","v5.28.0-RC3","v5.28.0-RC4","v5.29.0","v5.29.1","v5.29.10","v5.29.5","v5.29.6","v5.29.7","v5.29.8","v5.29.9","v5.30.0","v5.30.0-RC1","v5.30.0-RC2","v5.30.1","v5.30.1-RC1","v5.30.2","v5.30.2-RC1","v5.30.3-RC1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10878.json","vanir_signatures":[{"source":"https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","digest":{"line_hashes":["208104537241862015831634570263967234427","109591170869883114777358144374189721285","42157035885487481933578822453596385796","237969083252350185014251097330798889379","45097971996926810749490705492650370133","230966189757621904955279591980719521506","88705216833813009544652802488462210001","56173345468256524049152942639616975726","300773050691948700241669343172250730207","121820201678158919733163831528671585272","310588222029912181777022496131260583560","281244469944256167855163107970183219175","254830404964833400002945178185556661331","223580085282543282527595686443513234487","327152608380150713768016125315165903436","139906220994111558633442498771552722674","336094069936405312381050738761245432689","127430501669018389257824546445626650970","219367538197480082652513924286798074336","298568298838796895977971181804043196548","162798474371039859738863733184015458404","147763636824437493179178872939034505123","120366056670382842213562300168405503265","98292714333485444554882717394695247440","280476054667861016036867082192224374617","270702158668501381413521551564839322307","154834673169728590277918734626009749031","282795605729960764972949036122775751497","48736620628819294166149503231881451329","219206564171465552255387231819258155000","28891289692587006929580919957390536796"],"threshold":0.9},"target":{"file":"regcomp.c"},"id":"CVE-2020-10878-46330eb7","signature_version":"v1","signature_type":"Line","deprecated":false},{"source":"https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","digest":{"function_hash":"8524261638944156246531292791513314139","length":39571},"target":{"function":"S_study_chunk","file":"regcomp.c"},"id":"CVE-2020-10878-a23aab87","signature_version":"v1","signature_type":"Function","deprecated":false},{"source":"https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","digest":{"threshold":0.9,"line_hashes":["266707645065597100250598232329532688965","318833503918020161080704189708195538048","300315180498650684150983846777006318956","94467647870240928604985091390006031359"]},"target":{"file":"proto.h"},"id":"CVE-2020-10878-a3007ae4","signature_version":"v1","signature_type":"Line","deprecated":false}],"vanir_signatures_modified":"2026-04-11T15:27:40Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.3.0"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.5.0"}]},{"events":[{"introduced":"16.1.0"},{"last_affected":"16.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.2"}]},{"events":[{"introduced":"0"},{"last_affected":"46.7"}]},{"events":[{"introduced":"0"},{"last_affected":"46.8"}]},{"events":[{"introduced":"0"},{"last_affected":"46.9"}]},{"events":[{"introduced":"13.1"},{"last_affected":"13.4"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.3.0"}]},{"events":[{"introduced":"10.3.0.0.0"},{"last_affected":"10.3.0.2.1"}]},{"events":[{"introduced":"10.4.0.1.0"},{"last_affected":"10.4.0.3.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.2.0.8"}]},{"events":[{"introduced":"0"},{"last_affected":"13.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.1"}]},{"events":[{"introduced":"7.4.0"},{"last_affected":"7.7.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}]}