• 公告ID (KylinSec-SA-2025-2528)

摘要:

perl security update

安全等级: Critical

公告ID: KylinSec-SA-2025-2528

发布日期: 2025年6月13日

关联CVE: CVE-2024-56406  

  • 详细介绍

1. 漏洞描述

   

Perl 5 is a highly capable, feature-rich programming language with over 30 years of development. Perl 5 runs on over 100 platforms from portables to mainframes and is suitable for both rapid prototyping and large scale development projects.

Security Fix(es):

A heap buffer overflow vulnerability was discovered in Perl.

Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.

When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.

   $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'
   Segmentation fault (core dumped)

It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.(CVE-2024-56406)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-56406 KY3.5.3 perl Fixed

3. 影响组件

    perl

4. 修复版本

   

KY3.5.3

软件名称 架构 版本号
perl-help noarch 5.34.0-13.ky3_5.kb1
perl x86_64 5.34.0-13.ky3_5.kb1
perl-devel x86_64 5.34.0-13.ky3_5.kb1
perl-libs x86_64 5.34.0-13.ky3_5.kb1
perl aarch64 5.34.0-13.ky3_5.kb1
perl-devel aarch64 5.34.0-13.ky3_5.kb1
perl-libs aarch64 5.34.0-13.ky3_5.kb1

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.3:

x86_64:

     perl-help   

     perl   

     perl-devel   

     perl-libs   

aarch64:

     perl-help   

     perl   

     perl-devel   

     perl-libs   

上一篇:KylinSec-SA-2025-2524 下一篇:KylinSec-SA-2025-2535