Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

41 – 50 of 204 results


CVE-2013-7491

Medium priority
Not affected

An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.

1 affected packages

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdbi-perl Not affected Not affected Not affected
Show less packages

CVE-2013-7490

Medium priority
Fixed

An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.

1 affected packages

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdbi-perl Not affected Not affected Not affected
Show less packages

CVE-2020-14392

Medium priority
Fixed

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.

1 affected packages

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdbi-perl Not affected Fixed Fixed
Show less packages

CVE-2020-12723

Low priority

Some fixes available 4 of 5

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. An application written in Perl would only be vulnerable to this flaw if it evaluates regular...

1 affected packages

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
perl Fixed Fixed Fixed
Show less packages

CVE-2020-10878

Low priority

Some fixes available 4 of 5

Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. An...

1 affected packages

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
perl Fixed Fixed Fixed
Show less packages

CVE-2020-10543

Low priority

Some fixes available 4 of 5

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. An application written in Perl would only be vulnerable to this flaw if it...

1 affected packages

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
perl Fixed Fixed Fixed
Show less packages

CVE-2013-7488

Low priority
Vulnerable

perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.

1 affected packages

libconvert-asn1-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libconvert-asn1-perl Vulnerable Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2020-10674

Medium priority
Vulnerable

PerlSpeak through 2.01 allows attackers to execute arbitrary OS commands, as demonstrated by use of system and 2-argument open.

1 affected packages

libperlspeak-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libperlspeak-perl Not in release Not in release Not in release Vulnerable Vulnerable
Show less packages

CVE-2011-4116

Low priority
Ignored

_is_safe in the File::Temp module for Perl does not properly handle symlinks.

2 affected packages

libfile-temp-perl, perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libfile-temp-perl
perl
Show less packages

CVE-2011-4115

Low priority
Vulnerable

Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.

1 affected packages

libparallel-forkmanager-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libparallel-forkmanager-perl Vulnerable Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages