First published: Mon Nov 05 2018(Updated: )
A flaw was found in Perl versions 5.18 through 5.28. A Heap-based buffer overflow Upstream Patch: <a href="https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f">https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl | <5.26.3 | 5.26.3 |
redhat/perl | <5.28.1 | 5.28.1 |
Perl Perl | <5.26.3 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =9.0 | |
NetApp E-Series SANtricity OS Controller | >=11.0<=11.40 | |
NetApp Snap Creator Framework | ||
Netapp Snapcenter | ||
Netapp Snapdrive Unix | ||
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
debian/perl | 5.32.1-4+deb11u3 5.32.1-4+deb11u4 5.36.0-7+deb12u1 5.40.0-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18314 is a vulnerability in Perl before version 5.26.3 that allows for a buffer overflow through a crafted regular expression.
CVE-2018-18314 has a severity rating of 9.8 (Critical).
Perl versions up to and excluding 5.26.3 are affected.
To fix CVE-2018-18314, update Perl to version 5.26.3 or later.
You can find more information about CVE-2018-18314 at the following references: [1] [2] [3].