Search for packages
Package details: pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2
purl pkg:deb/debian/perl@5.36.0-7%2Bdeb12u2
Next non-vulnerable version 5.40.1-3
Latest non-vulnerable version 5.40.1-3
Risk 3.6
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-m8p9-8hjz-aaae
Aliases:
CVE-2023-31484
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
5.38.2-3
Affected by 0 other vulnerabilities.
5.38.2-4
Affected by 0 other vulnerabilities.
5.38.2-5
Affected by 0 other vulnerabilities.
5.40.1-2
Affected by 0 other vulnerabilities.
5.40.1-3
Affected by 0 other vulnerabilities.
VCID-wp6a-qnkv-aaaf
Aliases:
CVE-2023-31486
HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
5.38.2-3
Affected by 0 other vulnerabilities.
5.38.2-4
Affected by 0 other vulnerabilities.
5.38.2-5
Affected by 0 other vulnerabilities.
5.40.1-2
Affected by 0 other vulnerabilities.
5.40.1-3
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-8v62-79q2-aaaj CPAN 2.28 allows Signature Verification Bypass. CVE-2020-16156
VCID-m8p9-8hjz-aaae CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS. CVE-2023-31484
VCID-tnb2-6jhr-z3gx A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses. CVE-2024-56406
VCID-wp6a-qnkv-aaaf HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates. CVE-2023-31486

Date Actor Action Vulnerability Source VulnerableCode Version
2025-06-22T15:19:56.599474+00:00 Debian Importer Affected by VCID-m8p9-8hjz-aaae https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-22T13:44:05.690233+00:00 Debian Importer Affected by VCID-wp6a-qnkv-aaaf https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T07:57:51.033911+00:00 Debian Importer Fixing VCID-m8p9-8hjz-aaae https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-21T03:42:32.755684+00:00 Debian Importer Fixing VCID-8v62-79q2-aaaj https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-20T23:47:01.263643+00:00 Debian Importer Fixing VCID-wp6a-qnkv-aaaf https://security-tracker.debian.org/tracker/data/json 36.1.3
2025-06-01T21:50:35.223182+00:00 Debian Importer Affected by VCID-m8p9-8hjz-aaae https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-06-01T20:31:19.398521+00:00 Debian Importer Affected by VCID-wp6a-qnkv-aaaf https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-05-17T21:40:40.552624+00:00 Debian Importer Fixing VCID-8v62-79q2-aaaj https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-23T18:47:25.903910+00:00 Debian Importer Fixing VCID-tnb2-6jhr-z3gx https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-22T03:36:08.478023+00:00 Debian Importer Fixing VCID-wp6a-qnkv-aaaf https://security-tracker.debian.org/tracker/data/json 36.0.0
2025-04-22T02:20:00.643644+00:00 Debian Importer Fixing VCID-m8p9-8hjz-aaae https://security-tracker.debian.org/tracker/data/json 36.0.0