Date: Thu, 1 Jun 2017 05:29:45 +0200 From: Kurt Jaeger <lists@opsec.eu> To: James E Keenan <jkeenan@pobox.com> Cc: perl@freebsd.org Subject: Re: Perl extension File-Path: vulnerability in two functions: CVE-2017-6512 Message-ID: <20170601032945.GG43031@home.opsec.eu> In-Reply-To: <bea10dd0-fe1d-9c44-1b5d-92e872cb64cb@pobox.com> References: <bea10dd0-fe1d-9c44-1b5d-92e872cb64cb@pobox.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi! > A vulnerability has been reported in Perl extension File-Path > (http://search.cpan.org/dist/File-Path/) versions 2.12 and earlier. [...] > This is the first time I have had to report a security vulnerability, so > I don't claim to fully grasp the protocol for making such a report. If > there is a better email address or other way to make this report, please > let me know. I've committed an update to 2.13 for the port devel/p5-File-Path. In general, it helps if you submit a problem report via bugs.freebsd.org, to track the issue. -- pi@opsec.eu +49 171 3101372 3 years to go !
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20170601032945.GG43031>