Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 Jun 2017 05:29:45 +0200
From:      Kurt Jaeger <lists@opsec.eu>
To:        James E Keenan <jkeenan@pobox.com>
Cc:        perl@freebsd.org
Subject:   Re: Perl extension File-Path: vulnerability in two functions: CVE-2017-6512
Message-ID:  <20170601032945.GG43031@home.opsec.eu>
In-Reply-To: <bea10dd0-fe1d-9c44-1b5d-92e872cb64cb@pobox.com>
References:  <bea10dd0-fe1d-9c44-1b5d-92e872cb64cb@pobox.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi!

> A vulnerability has been reported in Perl extension File-Path 
> (http://search.cpan.org/dist/File-Path/) versions 2.12 and earlier.
[...]
> This is the first time I have had to report a security vulnerability, so 
> I don't claim to fully grasp the protocol for making such a report.  If 
> there is a better email address or other way to make this report, please 
> let me know.

I've committed an update to 2.13 for the port devel/p5-File-Path.

In general, it helps if you submit a problem report via bugs.freebsd.org,
to track the issue.

-- 
pi@opsec.eu            +49 171 3101372                         3 years to go !



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20170601032945.GG43031>