{"id":"CVE-2018-6798","details":"An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.","modified":"2026-04-02T01:23:44.866470Z","published":"2018-04-17T20:29:00.580Z","related":["MGASA-2018-0241","SUSE-SU-2018:0976-1","SUSE-SU-2018:1074-1","SUSE-SU-2018:1972-1","SUSE-SU-2018:1972-2","SUSE-SU-2024:1630-1","SUSE-SU-2024:1762-1","SUSE-SU-2024:1762-2"],"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040681"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1192"},{"type":"ADVISORY","url":"https://rt.perl.org/Public/Bug/Display.html?id=132063"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201909-01"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3625-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4172"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/perl/perl5","events":[{"introduced":"70f63a4c7dba89e8e48b44de7978faae4319e693"},{"last_affected":"95388f2eb27e74cdbfb715c0097f16aeba4e6e4e"}],"database_specific":{"versions":[{"introduced":"5.22"},{"last_affected":"5.26"}]}}],"versions":["if-0.0605","v5.22.0","v5.22.1","v5.22.1-RC1","v5.22.1-RC2","v5.22.1-RC3","v5.22.1-RC4","v5.22.2","v5.22.2-RC1","v5.22.3","v5.22.3-RC1","v5.22.3-RC2","v5.22.3-RC3","v5.22.3-RC4","v5.22.3-RC5","v5.22.4","v5.22.4-RC1","v5.23.0","v5.23.1","v5.23.2","v5.23.3","v5.23.4","v5.23.5","v5.23.6","v5.23.7","v5.23.8","v5.23.9","v5.24.0","v5.24.0-RC1","v5.24.0-RC2","v5.24.0-RC3","v5.24.0-RC4","v5.24.0-RC5","v5.24.1","v5.24.1-RC1","v5.24.1-RC2","v5.24.1-RC3","v5.24.1-RC4","v5.24.1-RC5","v5.24.2","v5.24.2-RC1","v5.24.3","v5.24.3-RC1","v5.24.4","v5.24.4-RC1","v5.25.0","v5.25.1","v5.25.10","v5.25.11","v5.25.12","v5.25.2","v5.25.3","v5.25.4","v5.25.5","v5.25.6","v5.25.7","v5.25.8","v5.25.9","v5.26.0","v5.26.0-RC1","v5.26.0-RC2"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-6798.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}