A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
{
"binaries": [
{
"binary_version": "5.30.0-9ubuntu0.5",
"binary_name": "libperl-dev"
},
{
"binary_version": "5.30.0-9ubuntu0.5",
"binary_name": "libperl5.30"
},
{
"binary_version": "5.30.0-9ubuntu0.5",
"binary_name": "perl"
},
{
"binary_version": "5.30.0-9ubuntu0.5",
"binary_name": "perl-base"
},
{
"binary_version": "5.30.0-9ubuntu0.5",
"binary_name": "perl-debug"
},
{
"binary_version": "5.30.0-9ubuntu0.5",
"binary_name": "perl-modules-5.30"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.34.0-3ubuntu1.3",
"binary_name": "libperl-dev"
},
{
"binary_version": "5.34.0-3ubuntu1.3",
"binary_name": "libperl5.34"
},
{
"binary_version": "5.34.0-3ubuntu1.3",
"binary_name": "perl"
},
{
"binary_version": "5.34.0-3ubuntu1.3",
"binary_name": "perl-base"
},
{
"binary_version": "5.34.0-3ubuntu1.3",
"binary_name": "perl-debug"
},
{
"binary_version": "5.34.0-3ubuntu1.3",
"binary_name": "perl-modules-5.34"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.36.0-10ubuntu1",
"binary_name": "libperl-dev"
},
{
"binary_version": "5.36.0-10ubuntu1",
"binary_name": "libperl5.36"
},
{
"binary_version": "5.36.0-10ubuntu1",
"binary_name": "perl"
},
{
"binary_version": "5.36.0-10ubuntu1",
"binary_name": "perl-base"
},
{
"binary_version": "5.36.0-10ubuntu1",
"binary_name": "perl-debug"
},
{
"binary_version": "5.36.0-10ubuntu1",
"binary_name": "perl-modules-5.36"
}
],
"availability": "No subscription required"
}