<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for perl-Cpanel-JSON-XS is now available for openEuler-24.03-LTS-SP2</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2242</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-09-12</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-09-12</InitialReleaseDate>
		<CurrentReleaseDate>2025-09-12</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-09-12</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">perl-Cpanel-JSON-XS security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for perl-Cpanel-JSON-XS is now available for openEuler-24.03-LTS-SP2</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">This module converts Perl data structures to JSON and vice versa. Its primary goal is to be correct and its secondary goal is to be fast. To reach the latter goal it was written in C.

Security Fix(es):

Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact(CVE-2025-40929)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for perl-Cpanel-JSON-XS is now available for openEuler-24.03-LTS-SP2.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">perl-Cpanel-JSON-XS</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2242</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-40929</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-40929</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="perl-Cpanel-JSON-XS-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-4.37-2.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="perl-Cpanel-JSON-XS-debuginfo-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-debuginfo-4.37-2.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="perl-Cpanel-JSON-XS-debugsource-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-debugsource-4.37-2.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="perl-Cpanel-JSON-XS-help-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-help-4.37-2.oe2403sp2.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="perl-Cpanel-JSON-XS-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-4.37-2.oe2403sp2.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="perl-Cpanel-JSON-XS-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-4.37-2.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="perl-Cpanel-JSON-XS-debuginfo-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-debuginfo-4.37-2.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="perl-Cpanel-JSON-XS-debugsource-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-debugsource-4.37-2.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="perl-Cpanel-JSON-XS-help-4.37-2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">perl-Cpanel-JSON-XS-help-4.37-2.oe2403sp2.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact</Note>
		</Notes>
		<ReleaseDate>2025-09-12</ReleaseDate>
		<CVE>CVE-2025-40929</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.6</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>perl-Cpanel-JSON-XS security update</Description>
				<DATE>2025-09-12</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2242</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>