Skip to content
Robert Rothenberg edited this page Jul 9, 2022 · 6 revisions

This contains Frequently Asked Questions about CPAN Security Advisories (CPANSAs).

Where does this data come from?

Most of this information comes from the distributions' Changes files.

Other information, especially for embedded external libraries, comes from the NVD and CVE databases.

How do I report a new security issue?

CPAN::Audit is intended for published security issues.

If this is a new or unpublished security vulnerability with Perl or core Perl modules, then you should report it directly to the Perl security team as per the perl security policy.

If this is a new or unpublished security vulnerability with a CPAN module, then you should report it directly to the module maintainers. If the module documents a procedure for reporting security issues, follow that. Otherwise use the email addresses for the maintainers.

Please avoid reporting new security issues via the module's issue tracker, usually https://rt.cpan.org/ or on the module's source repository.

If this is a new security vulnerability with an external library that is included with a CPAN module, then you should report it directly to the library maintainers (following that library's documented security procedures), as well as the CPAN module authors.

How do I submit a published security issue?

Use the New Issue button in the issue tracker.

You can also submit a pull request. See the CONTRIBUTING documentation.

Note that you do not need to be one of the distribution's authors to submit a new security advisory.

How can I research published security issues?

The TODO list in the Wiki contains a list of distributions that need further investigation.

The issue tracker may also list distributions that need further research.

A distribution's Changes file will usually document any security fixes. It may also note any upgrades to included external libraries: this is useful for documenting any resolved security issues with those libraries for older versions of that distribution.

Check any external libraries that are included with the distribution. (This includes compiled libraries such as "zlib" as well as included JavaScript libraries such as "jQuery".) Is the version of that library covered by any security vulnerabilities?

You can search the NVD and CVE databases, as well as the library's change log for a list of known vulnerabilities in older versions of those libraries. (Note that sometimes fixes for security issues are published that are never reported as CVEs.)

If you know of a vulnerability in an external library, then you can also search for other distributions that use those libraries. The easiest way to do that is to check out a copy of the MetaCPAN Extracted Repository and search for files there, for example,

git ls-files | grep -F 'zlib.h'

How do I report a fixed security issue?

If a newer version of a distribution fixes a reported vulnerability, then you can submit an issue or open a pull request.

Note that you do not need to be one of the distribution's authors to submit a fix report.

I don't agree with one of the security advisories for a distribution

Submit an issue.

If the maintainers of this data agree that the issue is incorrect or not applicable, then they will remove it. Otherwise they may add a comment to the issue.

Can I use a distribution with a security advisory?

We don't block or remove distributions with security advisories, and the decision to use any code with a security advisory is up to you.

We recommend that you research the issue to determine whether it applies to your use case, or what steps you can take to reduce any risks of using that code.