Description
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
References (17)
Core 17
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4347
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1042181
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0010
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3834-2/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0001
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3834-1/
Mailing List, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Mar/42
Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Mar/49
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201909-01
Vendor Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpujul2020.html
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT209600
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190221-0003/
Third Party Advisory x_refsource_confirm
https://metacpan.org/changes/release/SHAY/perl-5.26.3
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1646738
Exploit, Third Party Advisory x_refsource_confirm
https://rt.perl.org/Ticket/Display.html?id=133192
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
Scores
CVSS v3
9.1
EPSS
0.0414
EPSS Percentile
88.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (17)
apple/mac_os_x
< 10.14.4
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
debian/debian_linux
9.0
netapp/e-series_santricity_os_controller
11.0 - 11.40
netapp/snap_creator_framework
netapp/snapcenter
... and 7 more
Published
Dec 07, 2018
Tracked Since
Feb 18, 2026