Search CVE reports


Toggle filters

61 – 70 of 238 results


CVE-2020-14393

Low priority

Some fixes available 2 of 3

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

1 affected package

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libdbi-perl Not affected Not affected Not affected Fixed
Show less packages

CVE-2020-14392

Medium priority
Fixed

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.

1 affected package

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libdbi-perl Not affected Fixed
Show less packages

CVE-2020-12723

Low priority

Some fixes available 4 of 5

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. An application written in Perl would only be vulnerable to this flaw if it evaluates regular...

1 affected package

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
perl Fixed Fixed
Show less packages

CVE-2020-10878

Low priority

Some fixes available 4 of 5

Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. An...

1 affected package

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
perl Fixed Fixed
Show less packages

CVE-2020-10674

Medium priority
Vulnerable

PerlSpeak through 2.01 allows attackers to execute arbitrary OS commands, as demonstrated by use of system and 2-argument open.

1 affected package

libperlspeak-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libperlspeak-perl Not in release Not in release Not in release Vulnerable
Show less packages

CVE-2020-10543

Low priority

Some fixes available 4 of 5

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. An application written in Perl would only be vulnerable to this flaw if it...

1 affected package

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
perl Fixed Fixed
Show less packages

CVE-2019-20919

Medium priority
Fixed

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

1 affected package

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libdbi-perl Not affected Fixed
Show less packages

CVE-2019-17533

Medium priority

Some fixes available 4 of 25

Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.

3 affected packages

libpdl-io-matlab-perl, libmatio, mldemos

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpdl-io-matlab-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
libmatio Not affected Not affected Fixed Fixed
mldemos Not in release Not in release Needs evaluation Not in release
Show less packages

CVE-2019-1010263

Medium priority
Needs evaluation

Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector...

1 affected package

libcrypt-jwt-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libcrypt-jwt-perl Needs evaluation Needs evaluation Needs evaluation Not in release
Show less packages

CVE-2019-1010161

Medium priority
Not affected

perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is:...

1 affected package

libcrypt-jwt-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libcrypt-jwt-perl Not in release
Show less packages