CVE-2024-56406

Name
CVE-2024-56406
Description
A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
patch https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
release-notes https://metacpan.org/release/SHAY/perl-5.38.4/changes
release-notes https://metacpan.org/release/SHAY/perl-5.40.2/changes
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/13/3
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/13/4
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2025/04/13/5

Match rules

CPE URI Source package Min version Max version
perl >= 5.41.0 <= 5.41.10
perl >= 5.39.0 < 5.40.2-RC1
perl >= 5.33.1 < 5.38.4-RC1
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* perl >= 5.33.1 < 5.38.4
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* perl >= 5.39.0 < 5.40.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
perl edge-main 5.40.2-r0 Celeste <cielesti@protonmail.com> fixed
perl edge-main 5.40.1-r1 Celeste <cielesti@protonmail.com> fixed
perl edge-main 5.40.1-r0 Celeste <cielesti@protonmail.com> possibly vulnerable
perl edge-main 5.40.0-r3 Celeste <cielesti@protonmail.com> possibly vulnerable
perl edge-main 5.38.1-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
perl edge-main 5.34.0-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
perl 3.22-main 5.40.2-r0 Celeste <cielesti@protonmail.com> fixed
perl 3.22-main 5.40.1-r1 None fixed
perl 3.22-main 5.38.1-r0 None possibly vulnerable
perl 3.22-main 5.34.0-r1 None possibly vulnerable
perl 3.21-main 5.40.1-r1 Celeste <cielesti@protonmail.com> fixed
perl 3.21-main 5.40.1-r0 Celeste <cielesti@protonmail.com> possibly vulnerable
perl 3.21-main 5.40.0-r3 Celeste <cielesti@protonmail.com> possibly vulnerable
perl 3.21-main 5.38.1-r0 None possibly vulnerable
perl 3.21-main 5.34.0-r1 None possibly vulnerable
perl 3.20-main 5.38.3-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
perl 3.20-main 5.38.3-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
perl 3.20-main 5.38.2-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
perl 3.20-main 5.38.1-r0 None possibly vulnerable
perl 3.20-main 5.34.0-r1 None possibly vulnerable
perl 3.19-main 5.38.3-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
perl 3.19-main 5.38.3-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
perl 3.19-main 5.38.2-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
perl 3.19-main 5.38.1-r0 None possibly vulnerable
perl 3.19-main 5.34.0-r1 None possibly vulnerable
perl 3.18-main 5.36.2-r1 Natanael Copa <ncopa@alpinelinux.org> fixed