diff --git a/advisories/published/2025/JLSEC-0000-mns68tglb-1vrjfw1.md b/advisories/published/2025/JLSEC-0000-mns68tglb-1vrjfw1.md new file mode 100644 index 0000000..c192565 --- /dev/null +++ b/advisories/published/2025/JLSEC-0000-mns68tglb-1vrjfw1.md @@ -0,0 +1,24 @@ +```toml +schema_version = "1.7.3" +id = "JLSEC-0000-mns68tglb-1vrjfw1" +modified = 2025-10-19T19:27:32.159Z +upstream = ["CVE-2023-31484"] +references = ["http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/andk/cpanpm/pull/175", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/", "https://metacpan.org/dist/CPAN/changes", "https://security.netapp.com/advisory/ntap-20240621-0007/", "https://www.openwall.com/lists/oss-security/2023/04/18/14", "http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/andk/cpanpm/pull/175", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/", "https://metacpan.org/dist/CPAN/changes", "https://security.netapp.com/advisory/ntap-20240621-0007/", "https://www.openwall.com/lists/oss-security/2023/04/18/14"] + +[[affected]] +pkg = "Perl_jll" +ranges = ["*"] + +[[jlsec_sources]] +id = "CVE-2023-31484" +imported = 2025-10-19T19:27:32.137Z +modified = 2024-11-21T08:01:57.707Z +published = 2023-04-29T00:15:09.000Z +url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-31484" +html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-31484" +``` + +# CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS. + +CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS. + diff --git a/advisories/published/2025/JLSEC-0000-mns68tgui-f4xo19.md b/advisories/published/2025/JLSEC-0000-mns68tgui-f4xo19.md new file mode 100644 index 0000000..bac5b19 --- /dev/null +++ b/advisories/published/2025/JLSEC-0000-mns68tgui-f4xo19.md @@ -0,0 +1,24 @@ +```toml +schema_version = "1.7.3" +id = "JLSEC-0000-mns68tgui-f4xo19" +modified = 2025-10-19T19:27:32.490Z +upstream = ["CVE-2023-31486"] +references = ["http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/chansen/p5-http-tiny/pull/153", "https://hackeriet.github.io/cpan-http-tiny-overview/", "https://www.openwall.com/lists/oss-security/2023/04/18/14", "https://www.openwall.com/lists/oss-security/2023/05/03/4", "https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/", "http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/chansen/p5-http-tiny/pull/153", "https://hackeriet.github.io/cpan-http-tiny-overview/", "https://security.netapp.com/advisory/ntap-20241129-0011/", "https://www.openwall.com/lists/oss-security/2023/04/18/14", "https://www.openwall.com/lists/oss-security/2023/05/03/4", "https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/"] + +[[affected]] +pkg = "Perl_jll" +ranges = ["*"] + +[[jlsec_sources]] +id = "CVE-2023-31486" +imported = 2025-10-19T19:27:32.490Z +modified = 2025-01-30T20:15:32.297Z +published = 2023-04-29T00:15:09.083Z +url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-31486" +html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-31486" +``` + +# HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an in... + +HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates. + diff --git a/advisories/published/2025/JLSEC-0000-mns68th0e-9fvy8w.md b/advisories/published/2025/JLSEC-0000-mns68th0e-9fvy8w.md new file mode 100644 index 0000000..557c7c8 --- /dev/null +++ b/advisories/published/2025/JLSEC-0000-mns68th0e-9fvy8w.md @@ -0,0 +1,24 @@ +```toml +schema_version = "1.7.3" +id = "JLSEC-0000-mns68th0e-9fvy8w" +modified = 2025-10-19T19:27:32.702Z +upstream = ["CVE-2023-47038"] +references = ["https://access.redhat.com/errata/RHSA-2024:2228", "https://access.redhat.com/errata/RHSA-2024:3128", "https://access.redhat.com/security/cve/CVE-2023-47038", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249523", "https://access.redhat.com/errata/RHSA-2024:2228", "https://access.redhat.com/errata/RHSA-2024:3128", "https://access.redhat.com/security/cve/CVE-2023-47038", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249523", "https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010", "https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6", "https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3", "https://github.com/aquasecurity/trivy/discussions/8400", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/", "https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property", "https://ubuntu.com/security/CVE-2023-47100", "https://www.suse.com/security/cve/CVE-2023-47100.html"] + +[[affected]] +pkg = "Perl_jll" +ranges = ["*"] + +[[jlsec_sources]] +id = "CVE-2023-47038" +imported = 2025-10-19T19:27:32.702Z +modified = 2025-10-07T18:15:32.663Z +published = 2023-12-18T14:15:08.933Z +url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-47038" +html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-47038" +``` + +# A vulnerability was found in perl 5.30.0 through 5.38.0 + +A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer. + diff --git a/advisories/published/2025/JLSEC-0000-mns68thcj-18jzv5c.md b/advisories/published/2025/JLSEC-0000-mns68thcj-18jzv5c.md new file mode 100644 index 0000000..6261aa4 --- /dev/null +++ b/advisories/published/2025/JLSEC-0000-mns68thcj-18jzv5c.md @@ -0,0 +1,24 @@ +```toml +schema_version = "1.7.3" +id = "JLSEC-0000-mns68thcj-18jzv5c" +modified = 2025-10-19T19:27:33.139Z +upstream = ["CVE-2023-47039"] +references = ["https://access.redhat.com/security/cve/CVE-2023-47039", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249525", "https://access.redhat.com/security/cve/CVE-2023-47039", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249525", "https://perldoc.perl.org/perl5382delta#CVE-2023-47039-Perl-for-Windows-binary-hijacking-vulnerability", "https://security.netapp.com/advisory/ntap-20240208-0005/"] + +[[affected]] +pkg = "Perl_jll" +ranges = ["< 5.34.0+0"] + +[[jlsec_sources]] +id = "CVE-2023-47039" +imported = 2025-10-19T19:27:33.139Z +modified = 2024-11-21T08:29:39.083Z +published = 2024-01-02T06:15:13.737Z +url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-47039" +html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-47039" +``` + +# A vulnerability was found in Perl + +A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations. + diff --git a/advisories/published/2025/JLSEC-0000-mns68thcm-19og699.md b/advisories/published/2025/JLSEC-0000-mns68thcm-19og699.md new file mode 100644 index 0000000..d551f4d --- /dev/null +++ b/advisories/published/2025/JLSEC-0000-mns68thcm-19og699.md @@ -0,0 +1,33 @@ +```toml +schema_version = "1.7.3" +id = "JLSEC-0000-mns68thcm-19og699" +modified = 2025-10-19T19:27:33.142Z +upstream = ["CVE-2024-56406"] +references = ["https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch", "https://metacpan.org/release/SHAY/perl-5.38.4/changes", "https://metacpan.org/release/SHAY/perl-5.40.2/changes", "http://www.openwall.com/lists/oss-security/2025/04/13/3", "http://www.openwall.com/lists/oss-security/2025/04/13/4", "http://www.openwall.com/lists/oss-security/2025/04/13/5"] + +[[affected]] +pkg = "Perl_jll" +ranges = [">= 5.34.0+0"] + +[[jlsec_sources]] +id = "CVE-2024-56406" +imported = 2025-10-19T19:27:33.142Z +modified = 2025-10-16T14:15:34.083Z +published = 2025-04-13T14:15:14.527Z +url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-56406" +html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-56406" +``` + +# A heap buffer overflow vulnerability was discovered in Perl. + +A heap buffer overflow vulnerability was discovered in Perl. + +Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. + +When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`. + +$ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' +   Segmentation fault (core dumped) + +It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses. +