{"id":"USN-6517-1","summary":"perl vulnerabilities","details":"It was discovered that Perl incorrectly handled printing certain warning\nmessages. An attacker could possibly use this issue to cause Perl to\nconsume resources, leading to a denial of service. This issue only affected\nUbuntu 22.04 LTS. (CVE-2022-48522)\n\nNathan Mills discovered that Perl incorrectly handled certain regular\nexpressions. An attacker could use this issue to cause Perl to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2023-47038)\n","modified":"2026-02-10T04:43:26Z","published":"2023-11-27T14:15:35Z","related":["UBUNTU-CVE-2022-48522","UBUNTU-CVE-2023-47038"],"upstream":["CVE-2022-48522","CVE-2023-47038","UBUNTU-CVE-2022-48522","UBUNTU-CVE-2023-47038"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6517-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48522"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-47038"}],"affected":[{"package":{"name":"perl","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/perl@5.30.0-9ubuntu0.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.30.0-9ubuntu0.5"}]}],"versions":["5.28.1-6build1","5.30.0-7","5.30.0-9","5.30.0-9build1","5.30.0-9ubuntu0.2","5.30.0-9ubuntu0.3","5.30.0-9ubuntu0.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.30.0-9ubuntu0.5","binary_name":"libperl-dev"},{"binary_version":"5.30.0-9ubuntu0.5","binary_name":"libperl5.30"},{"binary_version":"5.30.0-9ubuntu0.5","binary_name":"perl"},{"binary_version":"5.30.0-9ubuntu0.5","binary_name":"perl-base"},{"binary_version":"5.30.0-9ubuntu0.5","binary_name":"perl-debug"},{"binary_version":"5.30.0-9ubuntu0.5","binary_name":"perl-modules-5.30"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-47038"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6517-1.json"}},{"package":{"name":"perl","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/perl@5.34.0-3ubuntu1.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.34.0-3ubuntu1.3"}]}],"versions":["5.32.1-3ubuntu3","5.34.0-3ubuntu1","5.34.0-3ubuntu1.1","5.34.0-3ubuntu1.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.34.0-3ubuntu1.3","binary_name":"libperl-dev"},{"binary_version":"5.34.0-3ubuntu1.3","binary_name":"libperl5.34"},{"binary_version":"5.34.0-3ubuntu1.3","binary_name":"perl"},{"binary_version":"5.34.0-3ubuntu1.3","binary_name":"perl-base"},{"binary_version":"5.34.0-3ubuntu1.3","binary_name":"perl-debug"},{"binary_version":"5.34.0-3ubuntu1.3","binary_name":"perl-modules-5.34"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-48522"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-47038"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6517-1.json"}}],"schema_version":"1.7.3"}