The following table lists the changes that have been made to the
CVE-2024-56406 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 9b29abf9-4ab0-4765-b253-1875cd9b441eApr. 13, 2025
Action Type Old Value New Value Added Description A heap buffer overflow vulnerability was discovered in Perl. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.
$ perl -e ‘$_ = “x{FF}” x 1000000; tr/xFF/x{100}/;’
Segmentation fault (core dumped)It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
Added CWE CWE-787 Added CWE CWE-122 Added Reference https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch Added Reference https://metacpan.org/release/SHAY/perl-5.38.4/changes Added Reference https://metacpan.org/release/SHAY/perl-5.40.2/changes