Skip to content

Commit 8c3335d

Browse files
perldelta: Few edits mainly in Security section
1 parent 8b524d3 commit 8c3335d

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

pod/perldelta.pod

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -195,11 +195,12 @@ C<S_do_trans_invmap()> can overflow the destination pointer C<d>.
195195
It is believed that this vulnerability can enable Denial of Service or
196196
Arbitrary Code Execution attacks on platforms that lack sufficient defenses.
197197

198-
The patch to fix this issue (87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd)
199-
is applicable to all perls that are vulnerable, including those
200-
out-of-support.
198+
This problem was discovered by Nathan Mills and assigned
199+
[L<CVE-2024-56406|https://lists.security.metacpan.org/cve-announce/msg/28708725/>]
200+
by the L<CPAN Security Group|https://security.metacpan.org/>.
201201

202-
Discovered by: Nathan Mills.
202+
The patch to fix this issue (L<87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd|https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd>) is applicable to all perls that are vulnerable, including those
203+
out-of-support.
203204

204205
=head2 [CVE-2025-40909] Perl threads have a working directory race condition where file operations may target unintended paths
205206

@@ -665,7 +666,8 @@ Clarified that perl C<sort> is stable (and has been since v5.8.0).
665666

666667
=item *
667668

668-
The recommended alternatives to the C<rand()> function were updated to modern modules recommended by the CPAN Security Group.
669+
The recommended alternatives to the C<rand()> function were updated to modern modules
670+
recommended by the L<CPAN Security Group|https://security.metacpan.org/>.
669671
[L<GH #22873|https://github.com/Perl/perl5/pull/22873>]
670672

671673
=back
@@ -1267,7 +1269,7 @@ such as C<Encode.pm>.
12671269

12681270
=item *
12691271

1270-
The perl parser would erroneously parse some POD directives
1272+
The perl parser would erroneously parse some POD directives
12711273
as if they were C<=cut>. Some other POD directives
12721274
whose names start with I<cut>, prematurely terminating an embedded POD section.
12731275
The following cases were affected: I<cut> followed by a digit (e.g.
@@ -1301,7 +1303,7 @@ second evaluation. Properly clear any cached values. [L<GH #22784|https://githu
13011303
=item *
13021304

13031305
L<perlfunc/shmread> and L<perlfunc/shmwrite> are no longer limited to 31-bit
1304-
values and can use all the available bits on a platform for their POS and
1306+
values and can use all the available bits on a platform for their POS and
13051307
SIZE arguments.
13061308
[L<GH #22895|https://github.com/Perl/perl5/issues/22895>]
13071309

0 commit comments

Comments
 (0)