Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68tglb-1vrjfw1.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68tglb-1vrjfw1"
modified = 2025-10-19T19:27:32.159Z
upstream = ["CVE-2023-31484"]
references = ["http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/andk/cpanpm/pull/175", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/", "https://metacpan.org/dist/CPAN/changes", "https://security.netapp.com/advisory/ntap-20240621-0007/", "https://www.openwall.com/lists/oss-security/2023/04/18/14", "http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/andk/cpanpm/pull/175", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/", "https://metacpan.org/dist/CPAN/changes", "https://security.netapp.com/advisory/ntap-20240621-0007/", "https://www.openwall.com/lists/oss-security/2023/04/18/14"]

[[affected]]
pkg = "Perl_jll"
ranges = ["*"]

[[jlsec_sources]]
id = "CVE-2023-31484"
imported = 2025-10-19T19:27:32.137Z
modified = 2024-11-21T08:01:57.707Z
published = 2023-04-29T00:15:09.000Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-31484"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-31484"
```

# CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.

CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68tgui-f4xo19.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68tgui-f4xo19"
modified = 2025-10-19T19:27:32.490Z
upstream = ["CVE-2023-31486"]
references = ["http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/chansen/p5-http-tiny/pull/153", "https://hackeriet.github.io/cpan-http-tiny-overview/", "https://www.openwall.com/lists/oss-security/2023/04/18/14", "https://www.openwall.com/lists/oss-security/2023/05/03/4", "https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/", "http://www.openwall.com/lists/oss-security/2023/04/29/1", "http://www.openwall.com/lists/oss-security/2023/05/03/3", "http://www.openwall.com/lists/oss-security/2023/05/03/5", "http://www.openwall.com/lists/oss-security/2023/05/07/2", "https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/", "https://github.com/chansen/p5-http-tiny/pull/153", "https://hackeriet.github.io/cpan-http-tiny-overview/", "https://security.netapp.com/advisory/ntap-20241129-0011/", "https://www.openwall.com/lists/oss-security/2023/04/18/14", "https://www.openwall.com/lists/oss-security/2023/05/03/4", "https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/"]

[[affected]]
pkg = "Perl_jll"
ranges = ["*"]

[[jlsec_sources]]
id = "CVE-2023-31486"
imported = 2025-10-19T19:27:32.490Z
modified = 2025-01-30T20:15:32.297Z
published = 2023-04-29T00:15:09.083Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-31486"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-31486"
```

# HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an in...

HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68th0e-9fvy8w.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68th0e-9fvy8w"
modified = 2025-10-19T19:27:32.702Z
upstream = ["CVE-2023-47038"]
references = ["https://access.redhat.com/errata/RHSA-2024:2228", "https://access.redhat.com/errata/RHSA-2024:3128", "https://access.redhat.com/security/cve/CVE-2023-47038", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249523", "https://access.redhat.com/errata/RHSA-2024:2228", "https://access.redhat.com/errata/RHSA-2024:3128", "https://access.redhat.com/security/cve/CVE-2023-47038", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249523", "https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010", "https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6", "https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3", "https://github.com/aquasecurity/trivy/discussions/8400", "https://lists.fedoraproject.org/archives/list/[email protected]/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/", "https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property", "https://ubuntu.com/security/CVE-2023-47100", "https://www.suse.com/security/cve/CVE-2023-47100.html"]

[[affected]]
pkg = "Perl_jll"
ranges = ["*"]

[[jlsec_sources]]
id = "CVE-2023-47038"
imported = 2025-10-19T19:27:32.702Z
modified = 2025-10-07T18:15:32.663Z
published = 2023-12-18T14:15:08.933Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-47038"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-47038"
```

# A vulnerability was found in perl 5.30.0 through 5.38.0

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68thcj-18jzv5c.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68thcj-18jzv5c"
modified = 2025-10-19T19:27:33.139Z
upstream = ["CVE-2023-47039"]
references = ["https://access.redhat.com/security/cve/CVE-2023-47039", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249525", "https://access.redhat.com/security/cve/CVE-2023-47039", "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746", "https://bugzilla.redhat.com/show_bug.cgi?id=2249525", "https://perldoc.perl.org/perl5382delta#CVE-2023-47039-Perl-for-Windows-binary-hijacking-vulnerability", "https://security.netapp.com/advisory/ntap-20240208-0005/"]

[[affected]]
pkg = "Perl_jll"
ranges = ["< 5.34.0+0"]

[[jlsec_sources]]
id = "CVE-2023-47039"
imported = 2025-10-19T19:27:33.139Z
modified = 2024-11-21T08:29:39.083Z
published = 2024-01-02T06:15:13.737Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-47039"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-47039"
```

# A vulnerability was found in Perl

A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.

33 changes: 33 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68thcm-19og699.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68thcm-19og699"
modified = 2025-10-19T19:27:33.142Z
upstream = ["CVE-2024-56406"]
references = ["https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch", "https://metacpan.org/release/SHAY/perl-5.38.4/changes", "https://metacpan.org/release/SHAY/perl-5.40.2/changes", "http://www.openwall.com/lists/oss-security/2025/04/13/3", "http://www.openwall.com/lists/oss-security/2025/04/13/4", "http://www.openwall.com/lists/oss-security/2025/04/13/5"]

[[affected]]
pkg = "Perl_jll"
ranges = [">= 5.34.0+0"]

[[jlsec_sources]]
id = "CVE-2024-56406"
imported = 2025-10-19T19:27:33.142Z
modified = 2025-10-16T14:15:34.083Z
published = 2025-04-13T14:15:14.527Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-56406"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-56406"
```

# A heap buffer overflow vulnerability was discovered in Perl.

A heap buffer overflow vulnerability was discovered in Perl.

Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.

When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.

$ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'
   Segmentation fault (core dumped)

It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.

Loading