First published: Mon Nov 27 2023(Updated: )
It was discovered that Perl incorrectly handled printing certain warning messages. An attacker could possibly use this issue to cause Perl to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-48522) Nathan Mills discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-47038)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/perl | <5.36.0-9ubuntu1.1 | 5.36.0-9ubuntu1.1 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/perl | <5.36.0-7ubuntu0.23.04.2 | 5.36.0-7ubuntu0.23.04.2 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/perl | <5.34.0-3ubuntu1.3 | 5.34.0-3ubuntu1.3 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/perl | <5.30.0-9ubuntu0.5 | 5.30.0-9ubuntu0.5 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Perl vulnerability is CVE-2022-48522.
An attacker could use this vulnerability to cause Perl to consume resources, leading to a denial of service.
This Perl vulnerability only affects Ubuntu 22.04 LTS.
To fix this Perl vulnerability, update Perl to version 5.36.0-9ubuntu1.1.
You can find more information about this Perl vulnerability on the Ubuntu website.