{"id":"CVE-2018-18314","details":"Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.","modified":"2026-05-17T11:54:28.273940715Z","published":"2018-12-07T21:29:00.920Z","related":["SUSE-SU-2018:4187-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"18.10"}],"vendor_product":"canonical:ubuntu_linux"},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux"},{"source":"CPE_FIELD","cpes":["cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"11.0"},{"last_affected":"11.40"}],"vendor_product":"netapp:e-series_santricity_os_controller"},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"},{"last_affected":"7.4"},{"last_affected":"7.5"},{"last_affected":"7.6"}],"vendor_product":"redhat:enterprise_linux"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106145"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1042181"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0001"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0010"},{"type":"ADVISORY","url":"https://metacpan.org/changes/release/SHAY/perl-5.26.3"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201909-01"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3834-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4347"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646751"},{"type":"FIX","url":"https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f"},{"type":"FIX","url":"https://rt.perl.org/Ticket/Display.html?id=131649"},{"type":"FIX","url":"https://security.netapp.com/advisory/ntap-20190221-0003/"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}