A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "libperl-dev" }, { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "libperl5.30" }, { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "perl" }, { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "perl-base" }, { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "perl-debug" }, { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "perl-doc" }, { "binary_version": "5.30.0-9ubuntu0.5", "binary_name": "perl-modules-5.30" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "libperl-dev" }, { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "libperl5.34" }, { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "perl" }, { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "perl-base" }, { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "perl-debug" }, { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "perl-doc" }, { "binary_version": "5.34.0-3ubuntu1.3", "binary_name": "perl-modules-5.34" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.36.0-10ubuntu1", "binary_name": "libperl-dev" }, { "binary_version": "5.36.0-10ubuntu1", "binary_name": "libperl5.36" }, { "binary_version": "5.36.0-10ubuntu1", "binary_name": "perl" }, { "binary_version": "5.36.0-10ubuntu1", "binary_name": "perl-base" }, { "binary_version": "5.36.0-10ubuntu1", "binary_name": "perl-debug" }, { "binary_version": "5.36.0-10ubuntu1", "binary_name": "perl-doc" }, { "binary_version": "5.36.0-10ubuntu1", "binary_name": "perl-modules-5.36" } ] }