G'day Tux,
++ Thanks for this notification and the CVE information.
Is there any official (or at least detailed) write-ups of these vulnerabilities? I typically just look in "Perl: Security Vulnerabilities, CVEs" but they weren't listed there. I also looked in quite a few other places; many just had "unknown", "not found", or a very minimal description; here's an incomplete list:
By way of comparison, these CVEs have, or link to, detailed discussions, workarounds, and such like: "CVE-2023-31484 (CPAN)" and "CVE-2023-31486 (HTTP::Tiny)".
Somewhat tangentially, as part of my searching I came across the extremely new — its timestamp had "AN HOUR AGO" — Test::CVE authored by your good self.
This looks like something I may add to the list of Standardised Author Tests that I've written for $work.
I do note from the INCENTIVE section:
"The functionality explicitly limits to passive analysis: the is no active scanning of source code to find security vulnerabilities."
Would I be correct in assuming that this would pick up issues with CPAN and HTTP::Tiny, but not a problematic \p{...}?
An affirmative answer would not preclude its use as one of my Standardised Author Tests; I would just want to document this limitation. As an example, another of these types of tests uses Test::MinimumVersion and its limitations are noted.
— Ken
In reply to Re: THREE new perl releases
by kcott
in thread THREE new perl releases
by Tux
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |