Debian Perl vulnerabilities

73 known vulnerabilities affecting debian/perl.

Total CVEs
73
CISA KEV
0
Public exploits
9
Exploited in wild
1
Severity breakdown
CRITICAL8HIGH23MEDIUM16LOW26

Vulnerabilities

Page 2 of 4
CVE-2018-6798HIGHCVSS 7.5fixed in perl 5.26.1-6 (bookworm)2018
CVE-2018-6798 [HIGH] CVE-2018-6798: perl - An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dep... An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure. Scope: local bookworm: resolved (fixed in 5.26.1-6) bullseye: resolved (fixed in 5.26.1-6) forky: resolved (fixed in 5.26.1-6) sid: resolved (fixed in 5.26.1-6) trixie: resolved (fixed in
debian
CVE-2017-12883CRITICALCVSS 9.1fixed in perl 5.26.0-8 (bookworm)2017
CVE-2017-12883 [CRITICAL] CVE-2017-12883: perl - Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.... Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape. Scope: local bookworm: resolved (fixed in 5.26.0-8) bullseye: resolved (f
debian
CVE-2017-12837HIGHCVSS 7.5fixed in perl 5.26.0-8 (bookworm)2017
CVE-2017-12837 [HIGH] CVE-2017-12837: perl - Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 befo... Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier. Scope: local bookworm: resolved (fixed in 5.26.0-8) bullseye: resolved (fixed in 5.26.0-8) f
debian
CVE-2017-6512MEDIUMCVSS 5.9fixed in perl 5.24.1-3 (bookworm)2017
CVE-2017-6512 [MEDIUM] CVE-2017-6512: perl - Race condition in the rmtree and remove_tree functions in the File-Path module b... Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic. Scope: local bookworm: resolved (fixed in 5.24.1-3) bullseye: resolved (fixed in 5.24.1-3) forky: resolved (fixed in 5.24.1-3) sid: resolved (fixed in 5.24.1-3
debian
CVE-2017-12814LOWCVSS 9.82017
CVE-2017-12814 [CRITICAL] CVE-2017-12814: perl - Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in ... Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2016-2381HIGHCVSS 7.5fixed in perl 5.22.1-8 (bookworm)2016
CVE-2016-2381 [HIGH] CVE-2016-2381: perl - Perl might allow context-dependent attackers to bypass the taint protection mech... Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. Scope: local bookworm: resolved (fixed in 5.22.1-8) bullseye: resolved (fixed in 5.22.1-8) forky: resolved (fixed in 5.22.1-8) sid: resolved (fixed in 5.22.1-8) trixie: resolved (fixed in 5.22.1-8)
debian
CVE-2016-1238HIGHCVSS 7.8fixed in perl 5.22.2-3 (bookworm)2016
CVE-2016-1238 [HIGH] CVE-2016-1238: perl - (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archi... (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/z
debian
CVE-2016-6185HIGHCVSS 7.8fixed in perl 5.22.2-2 (bookworm)2016
CVE-2016-6185 [HIGH] CVE-2016-6185: perl - The XSLoader::load method in XSLoader in Perl does not properly locate .so files... The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. Scope: local bookworm: resolved (fixed in 5.22.2-2) bullseye: resolved (fixed in 5.22.2-2) forky: resolved (fixed in 5.22.2-2) sid: resolved (
debian
CVE-2015-8607HIGHCVSS 7.3fixed in perl 5.22.1-4 (bookworm)2015
CVE-2015-8607 [HIGH] CVE-2015-8607: perl - The canonpath function in the File::Spec module in PathTools before 3.62, as use... The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. Scope: local bookworm: resolved (fixed in 5.22.1-4) bullseye: resolved (fixed in 5.22.1-4) forky: resolved (fixed in
debian
CVE-2015-8853HIGHCVSS 7.5fixed in perl 5.22.1-1 (bookworm)2015
CVE-2015-8853 [HIGH] CVE-2015-8853: perl - The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c ... The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80." Scope: local bookworm: resolved (fixed in 5.22.1-1) bullseye: resolved (fixed in 5.22.1-1) forky: resolved (fixed in 5.22.1-1) sid: resolved
debian
CVE-2015-8608LOWCVSS 9.82015
CVE-2015-8608 [CRITICAL] CVE-2015-8608: perl - The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attack... The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2014-4330LOWCVSS 2.1fixed in perl 5.20.1-1 (bookworm)2014
CVE-2014-4330 [LOW] CVE-2014-4330: perl - The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earli... The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function. Scope: local bookworm: resolved (fixed in 5.20.1-1) bullseye: re
debian
CVE-2013-1437CRITICALCVSS 9.8fixed in libmodule-metadata-perl 1.000015-1 (bookworm)2013
CVE-2013-1437 [CRITICAL] CVE-2013-1437: libmodule-metadata-perl - Eval injection vulnerability in the Module-Metadata module before 1.000015 for P... Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value. Scope: local bookworm: resolved (fixed in 1.000015-1) bullseye: resolved (fixed in 1.000015-1) forky: resolved (fixed in 1.000015-1) sid: resolved (fixed in 1.000015-1) trixie: resolved (
debian
CVE-2013-7422HIGHCVSS 7.5fixed in perl 5.20.0-1 (bookworm)2013
CVE-2013-7422 [HIGH] CVE-2013-7422: perl - Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before... Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression. Scope: local bookworm: resolved (fixed in 5.20.0-1) bullseye
debian
CVE-2013-1667HIGHCVSS 7.5fixed in perl 5.14.2-19 (bookworm)2013
CVE-2013-1667 [HIGH] CVE-2013-1667: perl - The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attac... The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. Scope: local bookworm: resolved (fixed in 5.14.2-19) bullseye: resolved (fixed in 5.14.2-19) forky: resolved (fixed in 5.14.2-19) sid: resolved (fixed in 5.14.2-19) trixie: resolved (fixed in 5.14.2-19)
debian
CVE-2012-6329HIGHCVSS 7.5PoCfixed in perl 5.14.2-16 (bookworm)2012
CVE-2012-6329 [HIGH] CVE-2012-6329: perl - The _compile function in Maketext.pm in the Locale::Maketext implementation in P... The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrat
debian
CVE-2012-5195HIGHCVSS 7.5fixed in perl 5.14.2-14 (bookworm)2012
CVE-2012-5195 [HIGH] CVE-2012-5195: perl - Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12... Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. Scope: local bookworm: resolved (fixed in 5.14.2-14) bullseye
debian
CVE-2012-5526MEDIUMCVSS 5.0fixed in libcgi-pm-perl 3.61-2 (bookworm)2012
CVE-2012-5526 [MEDIUM] CVE-2012-5526: libcgi-pm-perl - CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-... CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. Scope: local bookworm: resolved (fixed in 3.61-2) bullseye: resolved (fixed in 3.61-2) forky: resolved (fixed in 3.61-2) sid: resolved (fixed
debian
CVE-2011-4116LOWCVSS 3.32011
CVE-2011-4116 [LOW] CVE-2011-4116: perl - _is_safe in the File::Temp module for Perl does not properly handle symlinks. _is_safe in the File::Temp module for Perl does not properly handle symlinks. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2011-2939LOWCVSS 5.1fixed in libencode-perl 2.44-1 (bookworm)2011
CVE-2011-2939 [MEDIUM] CVE-2011-2939: libencode-perl - Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode m... Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Scope: local bookworm: resolved (fixed in 2.44-1) bullseye: resolve
debian