First published: Mon Apr 16 2018(Updated: )
It was discovered that Perl incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause Perl to hang, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-8853) It was discovered that Perl incorrectly loaded libraries from the current working directory. A local attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6185) It was discovered that Perl incorrectly handled the rmtree and remove_tree functions. A local attacker could possibly use this issue to set the mode on arbitrary files. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-6512) Brian Carpenter discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue has only been addressed in Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6797) Nguyen Duc Manh discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6798) GwanYeong Kim discovered that Perl incorrectly handled certain data when using the pack function. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-6913)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/perl | <5.26.0-8ubuntu1.1 | 5.26.0-8ubuntu1.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/perl | <5.22.1-9ubuntu0.3 | 5.22.1-9ubuntu0.3 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/perl | <5.18.2-2ubuntu1.4 | 5.18.2-2ubuntu1.4 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is USN-3625-1.
The severity of USN-3625-1 is not specified in the information provided.
USN-3625-1 affects Perl versions 5.26.0-8ubuntu1.1, 5.22.1-9ubuntu0.3, and 5.18.2-2ubuntu1.4.
This vulnerability can be exploited by an attacker to cause Perl to hang, resulting in a denial of service.
To fix USN-3625-1, update to Perl version 5.26.0-8ubuntu1.1 if you are using Ubuntu 17.10, version 5.22.1-9ubuntu0.3 if you are using Ubuntu 16.04, or version 5.18.2-2ubuntu1.4 if you are using Ubuntu 14.04.