A crafted regular expression when compiled by perl 5.30.0 through 5.38.0 can cause a one attacker controlled byte buffer overflow in a heap allocated buffer.
Created perl tracking bugs for this issue: Affects: fedora-all [bug 2251622] Created perl:5.32/perl tracking bugs for this issue: Affects: fedora-all [bug 2251623] Created perl:5.34/perl tracking bugs for this issue: Affects: fedora-all [bug 2251624] Created perl:5.36/perl tracking bugs for this issue: Affects: fedora-all [bug 2251625]
*** Bug 2255476 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2228 https://access.redhat.com/errata/RHSA-2024:2228
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3128 https://access.redhat.com/errata/RHSA-2024:3128