Debian Perl vulnerabilities

73 known vulnerabilities affecting debian/perl.

Total CVEs
73
CISA KEV
0
Public exploits
9
Exploited in wild
1
Severity breakdown
CRITICAL8HIGH23MEDIUM16LOW26

Vulnerabilities

Page 1 of 4
CVE-2026-4176LOWCVSS 2.9fixed in perl 5.10.0-21 (bookworm)2026
CVE-2026-4176 [LOW] CVE-2026-4176: perl - Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from ... Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundle
debian
CVE-2025-40909MEDIUMCVSS 5.9fixed in perl 5.36.0-7+deb12u3 (bookworm)2025
CVE-2025-40909 [MEDIUM] CVE-2025-40909: perl - Perl threads have a working directory race condition where file operations may t... Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. This may lead to unintended opera
debian
CVE-2024-56406HIGHCVSS 8.4fixed in perl 5.36.0-7+deb12u2 (bookworm)2024
CVE-2024-56406 [HIGH] CVE-2024-56406: perl - A heap buffer overflow vulnerability was discovered in Perl. Release branches ... A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`. $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' S
debian
CVE-2023-31484HIGHCVSS 8.1fixed in perl 5.36.0-7+deb12u3 (bookworm)2023
CVE-2023-31484 [HIGH] CVE-2023-31484: perl - CPAN.pm before 2.35 does not verify TLS certificates when downloading distributi... CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS. Scope: local bookworm: resolved (fixed in 5.36.0-7+deb12u3) bullseye: resolved (fixed in 5.32.1-4+deb11u4) forky: resolved (fixed in 5.38.2-2) sid: resolved (fixed in 5.38.2-2) trixie: resolved (fixed in 5.38.2-2)
debian
CVE-2023-47038HIGHCVSS 7.0fixed in perl 5.36.0-7+deb12u1 (bookworm)2023
CVE-2023-47038 [HIGH] CVE-2023-47038: perl - A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when ... A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer. Scope: local bookworm: resolved (fixed in 5.36.0-7+deb12u1) bullseye: resolved (fixed in 5.32.1-4+deb11u3) forky: resolved (fixed in 5.36.0-10) sid: reso
debian
CVE-2023-31486LOWCVSS 8.1fixed in libhttp-tiny-perl 0.088-1 (forky)2023
CVE-2023-31486 [HIGH] CVE-2023-31486: libhttp-tiny-perl - HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalon... HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates. Scope: local bookworm: open forky: resolved (fixed in 0.088-1) sid: resolved (fixed in 0.088-1) trixie: resolved (fixed in 0.088-1)
debian
CVE-2023-47039LOWCVSS 7.82023
CVE-2023-47039 [HIGH] CVE-2023-47039: perl - A vulnerability was found in Perl. This security issue occurs while Perl for Win... A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for c
debian
CVE-2022-48522LOWCVSS 9.8fixed in perl 5.36.0-4 (bookworm)2022
CVE-2022-48522 [CRITICAL] CVE-2022-48522: perl - In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that ... In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation. Scope: local bookworm: resolved (fixed in 5.36.0-4) bullseye: resolved forky: resolved (fixed in 5.36.0-4) sid: resolved (fixed in 5.36.0-4) trixie: resolved (fixed in 5.36.0-4)
debian
CVE-2021-36770HIGHCVSS 7.8fixed in libencode-perl 3.08-2 (bookworm)2021
CVE-2021-36770 [HIGH] CVE-2021-36770: libencode-perl - Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain pri... Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator eva
debian
CVE-2020-12723HIGHCVSS 7.5fixed in perl 5.30.3-1 (bookworm)2020
CVE-2020-12723 [HIGH] CVE-2020-12723: perl - regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular e... regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. Scope: local bookworm: resolved (fixed in 5.30.3-1) bullseye: resolved (fixed in 5.30.3-1) forky: resolved (fixed in 5.30.3-1) sid: resolved (fixed in 5.30.3-1) trixie: resolved (fixed in 5.30.3-1)
debian
CVE-2020-10543HIGHCVSS 8.2fixed in perl 5.30.3-1 (bookworm)2020
CVE-2020-10543 [HIGH] CVE-2020-10543: perl - Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow becau... Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. Scope: local bookworm: resolved (fixed in 5.30.3-1) bullseye: resolved (fixed in 5.30.3-1) forky: resolved (fixed in 5.30.3-1) sid: resolved (fixed in 5.30.3-1) trixie: resolved (fixed in 5.30.3-1)
debian
CVE-2020-16156HIGHCVSS 7.8fixed in perl 5.36.0-4 (bookworm)2020
CVE-2020-16156 [HIGH] CVE-2020-16156: perl - CPAN 2.28 allows Signature Verification Bypass. CPAN 2.28 allows Signature Verification Bypass. Scope: local bookworm: resolved (fixed in 5.36.0-4) bullseye: resolved (fixed in 5.32.1-4+deb11u4) forky: resolved (fixed in 5.36.0-4) sid: resolved (fixed in 5.36.0-4) trixie: resolved (fixed in 5.36.0-4)
debian
CVE-2020-10878HIGHCVSS 8.6fixed in perl 5.30.3-1 (bookworm)2020
CVE-2020-10878 [HIGH] CVE-2020-10878: perl - Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regki... Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. Scope: local bookworm: resolved (fixed in 5.30.3-1) bullseye: resolved (fixed in 5.30.3-1) forky: resolved (fixed in 5.30.3-1) sid: resolved (fixed in
debian
CVE-2018-18311CRITICALCVSS 9.8fixed in perl 5.28.1-1 (bookworm)2018
CVE-2018-18311 [CRITICAL] CVE-2018-18311: perl - Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted ... Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations. Scope: local bookworm: resolved (fixed in 5.28.1-1) bullseye: resolved (fixed in 5.28.1-1) forky: resolved (fixed in 5.28.1-1) sid: resolved (fixed in 5.28.1-1) trixie: resolved (fixed in 5.28.1-1)
debian
CVE-2018-6797CRITICALCVSS 9.8fixed in perl 5.26.1-6 (bookworm)2018
CVE-2018-6797 [CRITICAL] CVE-2018-6797: perl - An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression ... An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written. Scope: local bookworm: resolved (fixed in 5.26.1-6) bullseye: resolved (fixed in 5.26.1-6) forky: resolved (fixed in 5.26.1-6) sid: resolved (fixed in 5.26.1-6) trixie: resolved (fixed in 5.26.1-6)
debian
CVE-2018-6913CRITICALCVSS 9.8fixed in perl 5.26.1-6 (bookworm)2018
CVE-2018-6913 [CRITICAL] CVE-2018-6913: perl - Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows con... Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count. Scope: local bookworm: resolved (fixed in 5.26.1-6) bullseye: resolved (fixed in 5.26.1-6) forky: resolved (fixed in 5.26.1-6) sid: resolved (fixed in 5.26.1-6) trixie: resolved (fixed in 5.26.1-6)
debian
CVE-2018-18312CRITICALCVSS 9.8fixed in perl 5.28.1-1 (bookworm)2018
CVE-2018-18312 [CRITICAL] CVE-2018-18312: perl - Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted ... Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations. Scope: local bookworm: resolved (fixed in 5.28.1-1) bullseye: resolved (fixed in 5.28.1-1) forky: resolved (fixed in 5.28.1-1) sid: resolved (fixed in 5.28.1-1) trixie: resolved (fixed in 5.28.1-1)
debian
CVE-2018-18314CRITICALCVSS 9.8fixed in perl 5.28.0-3 (bookworm)2018
CVE-2018-18314 [CRITICAL] CVE-2018-18314: perl - Perl before 5.26.3 has a buffer overflow via a crafted regular expression that t... Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations. Scope: local bookworm: resolved (fixed in 5.28.0-3) bullseye: resolved (fixed in 5.28.0-3) forky: resolved (fixed in 5.28.0-3) sid: resolved (fixed in 5.28.0-3) trixie: resolved (fixed in 5.28.0-3)
debian
CVE-2018-18313CRITICALCVSS 9.1fixed in perl 5.28.0-3 (bookworm)2018
CVE-2018-18313 [CRITICAL] CVE-2018-18313: perl - Perl before 5.26.3 has a buffer over-read via a crafted regular expression that ... Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory. Scope: local bookworm: resolved (fixed in 5.28.0-3) bullseye: resolved (fixed in 5.28.0-3) forky: resolved (fixed in 5.28.0-3) sid: resolved (fixed in 5.28.0-3) trixie: resolved (fixed in 5.28.0-3)
debian
CVE-2018-12015HIGHCVSS 7.5fixed in perl 5.26.2-6 (bookworm)2018
CVE-2018-12015 [HIGH] CVE-2018-12015: perl - In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypas... In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name. Scope: local bookworm: resolved (fixed in 5.26.2-6) bullseye: resolved (fixed in 5.26.2-6) forky: resolved (fixed in 5.26.2-6) sid: re
debian