CVE-2018-6797
Summary
| CVE | CVE-2018-6797 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-04-17 20:29:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| [CVE-2018-6797] heap-buffer-overflow (WRITE of size 1) in S_regatom (regcomp.c) · Issue #16185 · Perl/perl5 · GitHub |
CONFIRM |
rt.perl.org |
Patch, Vendor Advisory |
| Oracle Critical Patch Update Advisory - July 2020 |
MISC |
www.oracle.com |
|
| Perl: Multiple vulnerabilities (GLSA 201909-01) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| Apple macOS/OS X Multiple Remote Code Execution, Denial of Service, and Information Disclosure Attacks and Local Privilege Escalation Attacks - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| USN-3625-1: Perl vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Perl Heap Overflows Let Users Obtain Potentially Sensitive Information, Deny Service, and Execute Arbitrary Code - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| Debian -- Security Information -- DSA-4172-1 perl |
DEBIAN |
www.debian.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500523 Alpine Linux Security Update for perl
- 504284 Alpine Linux Security Update for perl
- 710131 Gentoo Linux Perl Multiple vulnerabilities (GLSA 201909-01)