A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
| Version | Score | Severity | Vector String |
|---|---|---|---|
| 3.1 | 7 | High | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Product | Vendor | Version |
|---|---|---|
| Red Hat Enterprise Linux 9 | Red Hat | 17.2.6 |
| Red Hat Enterprise Linux 6 | Red Hat | < publication |
| Red Hat Enterprise Linux 8 | Red Hat | n/a |
| Red Hat Enterprise Linux 7 | Red Hat | 17.2.9 |
| Red Hat Enterprise Linux 9 | Red Hat | < 2.0.4 |
| Red Hat Enterprise Linux 8 | Red Hat | n/a |
| Red Hat Enterprise Linux 8 | Red Hat | 18.3.4 |
| Red Hat Enterprise Linux 8 | Red Hat | 18.3.1 |
| Red Hat Enterprise Linux 8 | Red Hat | 9.5 |