A heap buffer overflow vulnerability was discovered in Perl.
Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.
When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.
$ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'
Segmentation fault (core dumped)
It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
CVSS
No CVSS.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2025/04/13/3 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/04/13/4 | Mailing List |
http://www.openwall.com/lists/oss-security/2025/04/13/5 | Mailing List |
https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch | Patch |
https://metacpan.org/release/SHAY/perl-5.38.4/changes | Release Notes |
https://metacpan.org/release/SHAY/perl-5.40.2/changes | Release Notes |
Configurations
Configuration 1 (hide)
|
History
30 Apr 2025, 15:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Perl perl
Perl |
|
CWE | CWE-787 | |
References | () http://www.openwall.com/lists/oss-security/2025/04/13/5 - Mailing List | |
References | () https://metacpan.org/release/SHAY/perl-5.40.2/changes - Release Notes | |
References | () https://metacpan.org/release/SHAY/perl-5.38.4/changes - Release Notes | |
References | () http://www.openwall.com/lists/oss-security/2025/04/13/3 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2025/04/13/4 - Mailing List | |
References | () https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch - Patch | |
CPE | cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* |
13 Apr 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`. $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses. |
13 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-13 14:15
Updated : 2025-04-30 15:21
NVD link : CVE-2024-56406
Mitre link : CVE-2024-56406
JSON object : View
Products Affected
perl
- perl
CWE
CWE-787
Out-of-bounds Write