摘要:
perl security update
安全等级: Critical
公告ID: KylinSec-SA-2025-2528
发布日期: 2025年6月13日
关联CVE: CVE-2024-56406
Perl 5 is a highly capable, feature-rich programming language with over 30 years of development. Perl 5 runs on over 100 platforms from portables to mainframes and is suitable for both rapid prototyping and large scale development projects.
Security Fix(es):
A heap buffer overflow vulnerability was discovered in Perl.
Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.
When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.
$ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'
Segmentation fault (core dumped)
It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.(CVE-2024-56406)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-56406 | KY3.5.3 | perl | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
perl-help | noarch | 5.34.0-13.ky3_5.kb1 |
perl | x86_64 | 5.34.0-13.ky3_5.kb1 |
perl-devel | x86_64 | 5.34.0-13.ky3_5.kb1 |
perl-libs | x86_64 | 5.34.0-13.ky3_5.kb1 |
perl | aarch64 | 5.34.0-13.ky3_5.kb1 |
perl-devel | aarch64 | 5.34.0-13.ky3_5.kb1 |
perl-libs | aarch64 | 5.34.0-13.ky3_5.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名