A heap buffer overflow vulnerability was discovered in Perl. 
Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.
When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.
   $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' 
   Segmentation fault (core dumped)
It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch | Patch | 
| https://metacpan.org/release/SHAY/perl-5.38.4/changes | Release Notes | 
| https://metacpan.org/release/SHAY/perl-5.40.2/changes | Release Notes | 
| http://www.openwall.com/lists/oss-security/2025/04/13/3 | Mailing List | 
| http://www.openwall.com/lists/oss-security/2025/04/13/4 | Mailing List | 
| http://www.openwall.com/lists/oss-security/2025/04/13/5 | Mailing List | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    16 Oct 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.4 | 
30 Apr 2025, 15:21
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Perl Perl perl | |
| CPE | cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch - Patch | |
| References | () https://metacpan.org/release/SHAY/perl-5.38.4/changes - Release Notes | |
| References | () https://metacpan.org/release/SHAY/perl-5.40.2/changes - Release Notes | |
| References | () http://www.openwall.com/lists/oss-security/2025/04/13/3 - Mailing List | |
| References | () http://www.openwall.com/lists/oss-security/2025/04/13/4 - Mailing List | |
| References | () http://www.openwall.com/lists/oss-security/2025/04/13/5 - Mailing List | 
18 Apr 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.6 | 
15 Apr 2025, 18:39
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
13 Apr 2025, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Apr 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`. $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses. | 
13 Apr 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Apr 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-13 14:15
Updated : 2025-10-16 14:15
NVD link : CVE-2024-56406
Mitre link : CVE-2024-56406
CVE.ORG link : CVE-2024-56406
JSON object : View
Products Affected
                perl
- perl
