Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: perl@packages.debian.org, perl@packages.debian.org
Control: affects -1 + src:perl
Hi, please pre-approve the attached one line security fix for sid/trixie
for CVE-2024-56406: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a
heap buffer overflow when transliterating non-ASCII bytes.
https://lists.security.metacpan.org/cve-announce/msg/28708725/
Control: tags -1 confirmed
On 2025-04-13 16:32:41 +0300, Niko Tyni wrote:
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: perl@packages.debian.org, perl@packages.debian.org
Control: affects -1 + src:perl
Hi, please pre-approve the attached one line security fix for sid/trixie for CVE-2024-56406: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a
heap buffer overflow when transliterating non-ASCII bytes.
https://lists.security.metacpan.org/cve-announce/msg/28708725/
Thanks for preparing the update. Please go ahead.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 482 |
Nodes: | 16 (2 / 14) |
Uptime: | 41:39:11 |
Calls: | 9,566 |
Files: | 13,656 |
Messages: | 6,141,865 |