drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in perl
| Name: |
Pufferüberlauf in perl |
|
| ID: |
DSA-5902-1 |
|
| Distribution: |
Debian |
|
| Plattformen: |
Debian bookworm |
|
| Datum: |
So, 13. April 2025, 22:08 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-56406 |
|
| Applikationen: |
Perl |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5902-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 13, 2025 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : perl CVE ID : CVE-2024-56406
Nathan Mills discovered a heap-based buffer overflow vulnerability in the implementation of the Perl programming language when transliterating non-ASCII bytes with tr///, which may result in denial of service, or potentially the execution of arbitrary code.
For the stable distribution (bookworm), this problem has been fixed in version 5.36.0-7+deb12u2.
We recommend that you upgrade your perl packages.
For the detailed security status of perl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/perl
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmf7vnRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Q1Nw//SChPxFjxWLUnVt/P+aiM4sGpR4modkNB0RXIwx8e+KE0bOF8vVCotifA GT7vkNaUXFvuA30QiPDeRP3JSvfo/7nim/teS2Q/2Wiv652VqaDNoox++YgqR3Pc CgACm4JxFaBwaaOvymBSszIJIBZf/zBm/feKW6X94RzIU/THTPEJ9oaQC24cE2G+ QT2hPFhtZdd0ctmKST7sxP6HF392ysR76U24vTo+FOTl3Cxn+W6bO+xc2cMWzXL+ CnQs68w43fUSvnY9wZ7BLxe3L6smlhwNlu11JBcX43KgeuLwxmefcK0+6UZ7OJ+S 83rJKI5PjCPqdboE3nB66kwxNOPsK6EQkW4K+AiGXh82VUwubRP/7hLWW9AWo/J6 Dw0OOlB3VCw48jUEHdLPkXkT+22I2KcJkM0jQVUTWec1OtsCZjYTLfAgoTkuXN36 0irJff2l3A90T9Xuiy+NFClUP3xHS94J2RfP85Hsi0xsbCn6eU++i9JJ2MGstjGp ts/KSHvrLBG6OZKf/Q1ChU6swuYRDadhzlrNipbDOVeUnja+d0f8SGDjdYSdvWjo uCBFNzIA+DYfR+Ba8EjL4VnzgTor/NV3yVvuGwv/Ly9nyzT05fka8vlSzy6yRTd4 z34sXCPwljNxC1BKecLJWWJMjCE/NF8+cTsdCXbvehqAyfSlMlc= =F7kG -----END PGP SIGNATURE-----
|
|
|
|