![]() |
|
Message-ID: <ra5dq7grenapn6i4u4wjdogxpxaqhqpbhwu3hhj4bovr42pad6@zta4tml47irw> Date: Sun, 13 Apr 2025 21:32:31 +0200 From: Stig Palmquist <stig@...g.io> To: oss-security@...ts.openwall.com Subject: Re: CVE-2024-56406: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes On 2025-04-13 16:47, Solar Designer wrote: [..] > As it was mentioned in the advance notification to distros, the issue > was introduced in: > > https://github.com/Perl/perl5/commit/a311ee08b6781f83a7785f578a26bbc21a7ae457 > > which is part of tags v5.33.1 to v5.41.10, so I guess those versions are > also affected. The fix commit is effectively a revert of the bug commit. Hi Alexander, Thank you for the feedback. We only considered release branches for the affected versions. To fix this, the CVE record has been updated to take into account development versions and release candidates: Versions: from 5.41.0 through 5.41.10 from 5.39.0 before 5.40.2-RC1 from 5.33.1 before 5.38.4-RC1 Best, -- Stig Palmquist
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.