You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
by the L<CPAN Security Group|https://security.metacpan.org/>.
201
201
202
-
Discovered by: Nathan Mills.
202
+
The patch to fix this issue (L<87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd|https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd>) is applicable to all perls that are vulnerable, including those
203
+
out-of-support.
203
204
204
205
=head2 [CVE-2025-40909] Perl threads have a working directory race condition where file operations may target unintended paths
205
206
@@ -665,7 +666,8 @@ Clarified that perl C<sort> is stable (and has been since v5.8.0).
665
666
666
667
=item *
667
668
668
-
The recommended alternatives to the C<rand()> function were updated to modern modules recommended by the CPAN Security Group.
669
+
The recommended alternatives to the C<rand()> function were updated to modern modules
670
+
recommended by the L<CPAN Security Group|https://security.metacpan.org/>.
0 commit comments