in reply to THREE new perl releases
G'day Tux,
++ Thanks for this notification and the CVE information.
Is there any official (or at least detailed) write-ups of these vulnerabilities? I typically just look in "Perl: Security Vulnerabilities, CVEs" but they weren't listed there. I also looked in quite a few other places; many just had "unknown", "not found", or a very minimal description; here's an incomplete list:
By way of comparison, these CVEs have, or link to, detailed discussions, workarounds, and such like: "CVE-2023-31484 (CPAN)" and "CVE-2023-31486 (HTTP::Tiny)".
Somewhat tangentially, as part of my searching I came across the extremely new — its timestamp had "AN HOUR AGO" — Test::CVE authored by your good self.
This looks like something I may add to the list of Standardised Author Tests that I've written for $work.
I do note from the INCENTIVE section:
"The functionality explicitly limits to passive analysis: the is no active scanning of source code to find security vulnerabilities."
Would I be correct in assuming that this would pick up issues with CPAN and HTTP::Tiny, but not a problematic \p{...}?
An affirmative answer would not preclude its use as one of my Standardised Author Tests; I would just want to document this limitation. As an example, another of these types of tests uses Test::MinimumVersion and its limitations are noted.
— Ken
|
---|
Replies are listed 'Best First'. | |
---|---|
Re^2: Test::CVE Was: THREE new perl releases
by Tux (Canon) on Nov 27, 2023 at 23:16 UTC |