First published: Mon Apr 14 2025(Updated: )
It was discovered that Perl incorrectly handled transliterating non-ASCII bytes. A remote attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/perl | <5.38.2-5ubuntu0.1 | 5.38.2-5ubuntu0.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/perl | <5.38.2-3.2ubuntu0.1 | 5.38.2-3.2ubuntu0.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/perl | <5.34.0-3ubuntu1.4 | 5.34.0-3ubuntu1.4 |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7434-1 has a severity level that could lead to denial of service or possible arbitrary code execution.
To fix USN-7434-1, you should upgrade Perl to version 5.38.2-5ubuntu0.1 or later, depending on your Ubuntu version.
The vulnerability in USN-7434-1 can be exploited by remote attackers to crash Perl or potentially execute arbitrary code.
USN-7434-1 affects specific versions of Ubuntu including 24.10, 24.04, and 22.04 with certain Perl versions.
There is no known workaround for USN-7434-1, so upgrading to a patched version is recommended.