First published: Mon Nov 05 2018(Updated: )
A flaw was found in Perl versions 5.18 through 5.26. A Heap-buffer-overflow write / reg_node overrun
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl | <5.26.3 | 5.26.3 |
redhat/perl | <5.28.1 | 5.28.1 |
Perl Perl | <5.26.3 | |
Perl Perl | >=5.28.0<5.28.1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
NetApp E-Series SANtricity OS Controller | >=11.0<=11.40 | |
NetApp Snap Creator Framework | ||
Netapp Snapcenter | ||
Netapp Snapdrive Unix | ||
debian/perl | 5.32.1-4+deb11u3 5.32.1-4+deb11u4 5.36.0-7+deb12u1 5.40.0-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2018-18312.
The severity level of CVE-2018-18312 is critical.
The affected software for CVE-2018-18312 includes Perl versions before 5.26.3 and 5.28.0 before 5.28.1.
To fix CVE-2018-18312, it is recommended to update Perl to version 5.26.3 or 5.28.1.
You can find more information about CVE-2018-18312 on the following references: [1] [2]