CPANSA-perl-2018-18313: perl vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2018-12-07T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2018-12-07T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 9.1 | Severity | Critical |
Original language | Language | en | |
Also referred to |
Vulnerability Description
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
Vulnerabilities
CVE-2018-18313
Vulnerability DescriptionPerl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
Weakness | CWE-125 : Out-of-bounds Read |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
perl less than 5.26.3 |
|
Fixed
- perl greater than or equal 5.26.3
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-perl-2018-18313 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2018/cpansa-perl-2018-18313.json - https://www.debian.org/security/2018/dsa-4347 external
https://www.debian.org/security/2018/dsa-4347 - https://usn.ubuntu.com/3834-2/ external
https://usn.ubuntu.com/3834-2/ - https://rt.perl.org/Ticket/Display.html?id=133192 external
https://rt.perl.org/Ticket/Display.html?id=133192 - https://metacpan.org/changes/release/SHAY/perl-5.26.3 external
https://metacpan.org/changes/release/SHAY/perl-5.26.3 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ external
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/ - https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62 external
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62 - https://bugzilla.redhat.com/show_bug.cgi?id=1646738 external
https://bugzilla.redhat.com/show_bug.cgi?id=1646738 - http://www.securitytracker.com/id/1042181 external
http://www.securitytracker.com/id/1042181 - https://usn.ubuntu.com/3834-1/ external
https://usn.ubuntu.com/3834-1/ - https://access.redhat.com/errata/RHSA-2019:0010 external
https://access.redhat.com/errata/RHSA-2019:0010 - https://access.redhat.com/errata/RHSA-2019:0001 external
https://access.redhat.com/errata/RHSA-2019:0001 - https://security.netapp.com/advisory/ntap-20190221-0003/ external
https://security.netapp.com/advisory/ntap-20190221-0003/ - https://support.apple.com/kb/HT209600 external
https://support.apple.com/kb/HT209600 - https://seclists.org/bugtraq/2019/Mar/42 external
https://seclists.org/bugtraq/2019/Mar/42 - http://seclists.org/fulldisclosure/2019/Mar/49 external
http://seclists.org/fulldisclosure/2019/Mar/49 - https://security.gentoo.org/glsa/201909-01 external
https://security.gentoo.org/glsa/201909-01 - https://www.oracle.com/security-alerts/cpujul2020.html external
https://www.oracle.com/security-alerts/cpujul2020.html - CVE-2018-18313 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2018-18313
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Fri Dec 7 00:00:00 2018 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/