{
  "threat_severity" : "Moderate",
  "public_date" : "2026-04-21T15:26:18Z",
  "bugzilla" : {
    "description" : "perl-Storable: Storable for Perl: Denial of service via stack overflow in retrieve_hook function",
    "id" : "2460147",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2460147"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-190",
  "details" : [ "A flaw was found in Storable for Perl. A remote attacker can exploit a vulnerability in the `retrieve_hook` function by crafting malicious data. This flaw occurs because the function incorrectly handles the length of class names, storing it as a signed integer but processing it as unsigned during read operations. Successful exploitation leads to a stack overflow, which can cause a denial of service." ],
  "statement" : "This is an Moderate denial of service flaw in perl-Storable. The vulnerability arises from incorrect handling of class name lengths during deserialization, which can lead to a stack overflow when processing specially crafted data. To exploit this vulnerability the attacker needs to trick the user to use a maliciously crafted data.",
  "affected_release" : [ {
    "product_name" : "Red Hat Hardened Images",
    "release_date" : "2026-04-10T00:00:00Z",
    "advisory" : "RHSA-2026:7578",
    "cpe" : "cpe:/a:redhat:hummingbird:1",
    "package" : "perl-storable-main-3.37-522.1.hum1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "perl-Storable",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "perl-Storable",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "perl:5.32/perl-Storable",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "perl-Storable",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "perl-Storable",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-20230\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-20230\nhttps://github.com/Perl/perl5/commit/a258c17c6937f79529c8319a829310e09cdbd216.patch\nhttps://github.com/Perl/perl5/issues/15831\nhttps://metacpan.org/release/RURBAN/Storable-3.05/changes\nhttps://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242533.html\nhttps://www.nntp.perl.org/group/perl.perl5.porters/2017/01/msg242703.html" ],
  "name" : "CVE-2017-20230",
  "csaw" : false
}