{"id":"UBUNTU-CVE-2013-7422","details":"Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.","modified":"2026-04-22T09:26:34.018335Z","published":"2015-08-16T00:00:00Z","related":["USN-2916-1"],"upstream":["CVE-2013-7422"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-7422"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2916-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2013-7422"}],"affected":[{"package":{"name":"perl","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/perl@5.18.2-2ubuntu1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.18.2-2ubuntu1.1"}]}],"versions":["5.14.2-21build1","5.18.1-4","5.18.1-4build1","5.18.1-5","5.18.2-2","5.18.2-2ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libcgi-fast-perl","binary_version":"5.18.2-2ubuntu1.1"},{"binary_name":"libperl5.18","binary_version":"5.18.2-2ubuntu1.1"},{"binary_name":"perl","binary_version":"5.18.2-2ubuntu1.1"},{"binary_name":"perl-base","binary_version":"5.18.2-2ubuntu1.1"},{"binary_name":"perl-debug","binary_version":"5.18.2-2ubuntu1.1"},{"binary_name":"perl-modules","binary_version":"5.18.2-2ubuntu1.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-7422.json"}}],"schema_version":"1.7.5","severity":[{"type":"Ubuntu","score":"low"}]}