This is a database of the security advisories for the Perl modules uploaded to CPAN.
This is a hand-picked database maintained by the Perl community. See CONTRIBUTING or the issues to see how you might help.
The main mirror is briandfoy/cpan-security-advisory on GitHub, but there are other copies:
- https://github.com/briandfoy/cpan-security-advisory
- https://bitbucket.org/briandfoy/cpan-security-advisory
- https://gitlab.com/briandfoy/cpan-security-advisory
If you want to mirror a copy, clone the repo and send me the link. Let's make this more resilient by keeping the data in several places.
For new issues without a CVE report, first report issues to the CPAN Security Group, which can analyze an issue, collect additional information, and request a CVE. Once a CVE is issued, we can add it to the CPAN Security Advisories.
- metacpan.org - modules Changes files with security fixes
- CVE databases
- OS distributions security advisory feeds:
To run the various programs, you'll need some Perl modules. Install cpanminus if you don't already have it:
$ make -f Makefile.repo setup
$ perl util/find_record CVE-2022-1234
There's a utility to make a record for you from a CVE report:
$ perl util/make_record CVE-2022-1234
This tool tries to guess the distribution name, but sometimes it can't. If it doesn't guess the distribution name, simply run it again with the the distribution name you want:
$ perl util/make_record CVE-2022-1234 Some-Package
Id format: CPANSA-<dist-name>-<year>-<sequence>
dist-name
is the main module name, not necessarily the affected module in the distributionyear
is the year of the report or discovery, not necessarily the year the problem was introducedsequence
is some integer. For single CVE reports, like CVE-2011-1589, use the same sequence number for easier maintenance
Database is in YAML format with a simple structure.
---
advisories:
- affected_versions:
- <9.31
cves: []
description: "Mojo::DOM did not correctly parse <script> tags.\n"
fixed_versions:
- '>=9.31'
github_security_advisory: []
id: CPANSA-Mojolicious-2022-03
references:
- https://github.com/mojolicious/mojo/commit/6f195d85db6756022d3599f7d2634975688c9550
- https://github.com/mojolicious/mojo/issues/2014
- https://github.com/mojolicious/mojo/issues/2015
reported: 2022-12-10
severity: ~
cpansa_version: 2
distribution: Mojolicious
last_checked: 1747589679
latest_version: 9.40
metacpan: https://metacpan.org/pod/Mojolicious
repo: https://github.com/mojolicious/mojo
There may be an additional comments
key with more information about
the advisory, especially if the description
comes from an external
source, such as a CVE report.
Check all the files for basic YAML:
$ make -f Makefile.repo test_all
Checking all the files can take a minute, so you can also just check the files that have changed:
$ make -f Makefile.repo test_new
Run the lint
target to check all of the report files:
$ make -f Makefile.repo lint
For command line checks take a look at CPAN-Audit module, or the cpan-audit repo.
$ cpan-audit module Catalyst '>7.0'
To see your new report, you'll have to regenerate the CPANSA::DB
database since
CPAN::Audit
does everything locally. That happens in the cpan-audit repo,
where this repo is a submodule.
brian d foy (briandfoy@pobox.com). If you'd like to help, just let me know by opening as issue. I'm happy to add people as committers on this repo. See [CONTRIBUTING.md] for more info.
- The original author and maintainer was Viacheslav Tykhanovskyi.
- Takumi Akiyama
- Takafumi Onaka
- Mala
- Robert Rothenberg
If you know of a security vulnerability that is not present in our database, feel free to contribute with a Pull Request. Let's make it as complete as possible!