We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`. $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
Reserved 2024-12-23 | Published 2025-04-13 | Updated 2025-04-18 | Assigner CPANSecCWE-122 Heap-based Buffer Overflow
Nathan Mills
github.com/...87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
metacpan.org/release/SHAY/perl-5.38.4/changes
metacpan.org/release/SHAY/perl-5.40.2/changes
Support options