Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "5.26.3"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.6"
}
]
},
{
"events": [
{
"introduced": "11.0"
},
{
"last_affected": "11.40"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "10.14.4"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-18313.json"
[
{
"id": "CVE-2018-18313-0a4ef1d6",
"digest": {
"line_hashes": [
"101663868690937553214163442339379018565",
"59784038656455587243834010724958712382",
"28653314884608291336798897290106167798",
"96782067870058283391976206744121659574",
"162305355118608742235120534489597881333",
"127016832599108291182225561584131541991",
"249628749345757174872968758037840711806",
"288202923974203869187008973508210421650",
"259826910144805988136646004747213420863",
"87602121002291453069095856109041256948",
"165962808217590646015153787518747062719",
"169368250554995426997668874526762561190",
"317752557994194264263538380391852906952",
"232794246500132610966781115686424671305"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "regcomp.c"
}
},
{
"id": "CVE-2018-18313-3fc0e987",
"digest": {
"function_hash": "83938533586342320801161483788721225942",
"length": 16823.0
},
"signature_type": "Function",
"source": "https://github.com/perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "regcomp.c",
"function": "S_regatom"
}
},
{
"id": "CVE-2018-18313-88bce564",
"digest": {
"function_hash": "256924597074835678896577529209401787607",
"length": 26791.0
},
"signature_type": "Function",
"source": "https://github.com/perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "regcomp.c",
"function": "S_regclass"
}
},
{
"id": "CVE-2018-18313-8c7e952f",
"digest": {
"function_hash": "63122755006878456440416897999935609546",
"length": 3419.0
},
"signature_type": "Function",
"source": "https://github.com/perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "regcomp.c",
"function": "S_grok_bslash_N"
}
}
]