1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633
|
=encoding utf-8
=for stopwords
CVE perlsecpolicy SV perl Perl SDBM HackerOne Mitre
=head1 NAME
perlsecpolicy - Perl security report handling policy
=head1 DESCRIPTION
The Perl project takes security issues seriously.
The responsibility for handling security reports in a timely and
effective manner has been delegated to a security team composed
of a subset of the Perl core developers.
This document describes how the Perl security team operates and
how the team evaluates new security reports.
=head1 REPORTING SECURITY ISSUES IN PERL
If you believe you have found a security vulnerability in the Perl
interpreter or modules maintained in the core Perl codebase,
email the details to
L<perl-security@perl.org|mailto:perl-security@perl.org>.
This address is a closed membership mailing list monitored by the Perl
security team.
You should receive an initial response to your report within 72 hours.
If you do not receive a response in that time, please contact
the L<Perl Steering Council|mailto:steering-council@perl.org>.
When members of the security team reply to your messages, they will
generally include the perl-security@perl.org address in the "To" or "CC"
fields of the response. This allows all of the security team to follow
the discussion and chime in as needed. Use the "Reply-all" functionality
of your email client when you send subsequent responses so that the
entire security team receives the message.
The security team will evaluate your report and make an initial
determination of whether it is likely to fit the scope of issues the
team handles. General guidelines about how this is determined are
detailed in the L</WHAT ARE SECURITY ISSUES> section.
If your report meets the team's criteria, you will be provided the issue's
CVE ID(s). Issue identifiers have the form CVE-YYYY-NNNNN, where YYYY is the
year the CVE was reported, and NNNNN is a unique number. Include this identifier
with any subsequent messages you send.
The security team will send periodic updates about the status of your
issue and guide you through any further action that is required to complete
the vulnerability remediation process. The stages vulnerabilities typically
go through are explained in the L</HOW WE DEAL WITH SECURITY ISSUES>
section.
=head1 WHAT ARE SECURITY ISSUES
A vulnerability is a behavior of a software system that compromises the
system's expected confidentiality, integrity or availability protections.
A security issue is a bug in one or more specific components of a software
system that creates a vulnerability.
Software written in the Perl programming language is typically composed
of many layers of software written by many different groups. It can be
very complicated to determine which specific layer of a complex real-world
application was responsible for preventing a vulnerable behavior, but this
is an essential part of fixing the vulnerability.
=head2 Software covered by the Perl security team
The Perl security team handles security issues in:
=over
=item *
The Perl interpreter
=item *
The Perl modules shipped with the interpreter that are developed in the core
Perl repository
=item *
The command line tools shipped with the interpreter that are developed in the
core Perl repository
=back
Files under the F<cpan/> directory in Perl's repository and release tarballs are
developed and maintained independently. The Perl security team does not
directly handle security issues for these modules, but since this code is
bundled with Perl, we will assist in forwarding the issue to the relevant
maintainer(s) and you can still report these issues to us in secrecy.
=head2 Bugs that may qualify as security issues in Perl
Perl is designed to be a fast and flexible general purpose programming
language. The Perl interpreter and Perl modules make writing safe and
secure applications easy, but they do have limitations.
As a general rule, a bug in Perl needs to meet all of the following
criteria to be considered a security issue:
=over
=item *
The vulnerable behavior is not mentioned in Perl's documentation
or public issue tracker.
=item *
The vulnerable behavior is not implied by an expected behavior.
=item *
The vulnerable behavior is not a generally accepted limitation of
the implementation.
=item *
The vulnerable behavior is likely to be exposed to attack in
otherwise secure applications written in Perl.
=item *
The vulnerable behavior provides a specific tangible benefit
to an attacker that triggers the behavior.
=back
=head2 Bugs that do not qualify as security issues in Perl
There are certain categories of bugs that are frequently reported to
the security team that do not meet the criteria listed above.
The following is a list of commonly reported bugs that are not
handled as security issues.
=head3 Feeding untrusted code to the interpreter
The Perl parser is not designed to evaluate untrusted code.
If your application requires the evaluation of untrusted code, it
should rely on an operating system level sandbox for its security.
=head3 Stack overflows due to excessive recursion
Excessive recursion is often caused by code that does
not enforce limits on inputs. The Perl interpreter assumes limits
on recursion will be enforced by the application.
=head3 Out of memory errors
Common Perl constructs such as C<pack>, the C<x> operator,
and regular expressions accept numeric quantifiers that control how
much memory will be allocated to store intermediate values or results.
If you allow an attacker to supply these quantifiers and consume all
available memory, the Perl interpreter will not prevent it.
=head3 Escape from a L<Safe> compartment
L<Opcode> restrictions and L<Safe> compartments are not supported as
security mechanisms. The Perl parser is not designed to evaluate
untrusted code.
=head3 Use of the C<p> and C<P> pack templates
These templates are unsafe by design.
=head3 Stack not reference-counted issues
These bugs typically present as use-after-free errors or as assertion
failures on the type of a C<SV>. Stack not reference-counted
crashes usually occur because code is both modifying a reference or
glob and using the values referenced by that glob or reference.
This type of bug is a long standing issue with the Perl interpreter
that seldom occurs in normal code. Examples of this type of bug
generally assume that attacker-supplied code will be evaluated by
the Perl interpreter.
=head3 Thawing attacker-supplied data with L<Storable>
L<Storable> is designed to be a very fast serialization format.
It is not designed to be safe for deserializing untrusted inputs.
=head3 Using attacker supplied L<SDBM_File> databases
The L<SDBM_File> module is not intended for use with untrusted SDBM
databases.
=head3 Badly encoded UTF-8 flagged scalars
This type of bug occurs when the C<:utf8> PerlIO layer is used to
read badly encoded data, or other mechanisms are used to directly
manipulate the UTF-8 flag on an SV.
A badly encoded UTF-8 flagged SV is not a valid SV. Code that
creates SV's in this fashion is corrupting Perl's internal state.
=head3 Issues that exist only in blead, or in a release candidate
The blead branch and Perl release candidates do not receive security
support. Security defects that are present only in pre-release
versions of Perl are handled through the normal bug reporting and
resolution process.
=head3 CPAN modules or other Perl project resources
The Perl security team is focused on the Perl interpreter and modules
maintained in the core Perl codebase. The team has no special access
to fix CPAN modules, applications written in Perl, Perl project websites,
Perl mailing lists or the Perl IRC servers.
=head3 Emulated POSIX behaviors on Windows systems
The Perl interpreter attempts to emulate C<fork>, C<system>, C<exec>
and other POSIX behaviors on Windows systems. This emulation has many
quirks that are extensively documented in Perl's public issue tracker.
Changing these behaviors would cause significant disruption for existing
users on Windows.
=head2 Bugs that require special categorization
Some bugs in the Perl interpreter occur in areas of the codebase that are
both security sensitive and prone to failure during normal usage.
=head3 Regular expressions
Untrusted regular expressions are generally safe to compile and match against
with several caveats. The following behaviors of Perl's regular expression
engine are the developer's responsibility to constrain.
The evaluation of untrusted regular expressions while C<use re 'eval';> is
in effect is never safe.
Regular expressions are not guaranteed to compile or evaluate in any specific
finite time frame.
Regular expressions may consume all available system memory when they are
compiled or evaluated.
Regular expressions may cause excessive recursion that halts the perl
interpreter.
As a general rule, do not expect Perl's regular expression engine to
be resistant to denial of service attacks.
=head3 L<DB_File>, L<ODBM_File>, or L<GDBM_File> databases
These modules rely on external libraries to interact with database files.
Bugs caused by reading and writing these file formats are generally caused
by the underlying library implementation and are not security issues in
Perl.
Bugs where Perl mishandles unexpected valid return values from the underlying
libraries may qualify as security issues in Perl.
=head3 Algorithmic complexity attacks
The perl interpreter is reasonably robust to algorithmic complexity
attacks. It is not immune to them.
Algorithmic complexity bugs that depend on the interpreter processing
extremely large amounts of attacker supplied data are not generally handled
as security issues.
See L<perlsec/Algorithmic Complexity Attacks> for additional information.
=head1 HOW WE DEAL WITH SECURITY ISSUES
The Perl security team follows responsible disclosure practices. Security issues
are kept secret until a fix is readily available for most users. This minimizes
inherent risks users face from vulnerabilities in Perl.
Hiding problems from the users temporarily is a necessary trade-off to keep
them safe. Hiding problems from users permanently is not the goal.
When you report a security issue privately to the
L<perl-security@perl.org|mailto:perl-security@perl.org> contact address, we
normally expect you to follow responsible disclosure practices in the handling
of the report. If you are unable or unwilling to keep the issue secret until
a fix is available to users you should state this clearly in the initial
report.
The security team's vulnerability remediation workflow is intended to be as
open and transparent as possible about the state of your security report.
=head2 Perl's vulnerability remediation workflow
=head3 Initial contact
New vulnerability reports will receive an initial reply within 72 hours
from the time they arrive at the security team's mailing list. If you do
not receive any response in that time, contact the
L<Perl Steering Council|mailto:steering-council@perl.org>.
The initial response sent by the security team will confirm your message was
received and provide an estimated time frame for the security team's
triage analysis.
=head3 Initial triage
The security team will evaluate the report and determine whether or not
it is likely to meet the criteria for handling as a security issue.
The security team aims to complete the initial report triage within
two weeks' time. Complex issues that require significant discussion or
research may take longer.
If the security report cannot be reproduced or does not meet the team's
criteria for handling as a security issue, you will be notified by email
and given an opportunity to respond.
=head3 CVE assignment
Security reports that pass initial triage analysis are turned into CVEs.
When a report progresses to this point, one or more CVEs are reserved by
the security team. Issue identifiers have the form CVE-YYYY-NNNNN, where
YYYY is the year the CVE was reported, and NNNNN is a unique number. The
CVE will be used in any subsequent communications about the issue.
The assignment of these IDs do not confirm that a security report represents
a vulnerability in Perl. Many reports require further analysis to reach that
determination. The vulnerability should not be discussed publicly at this stage.
An internal ticket will also be opened. These identifiers have the format
perl-security#NNN or Perl/perl-security#NNN.
Issues in the security team's private tracker are used to collect details
about the problem and track progress towards a resolution. These notes and
other details are not made public when the issue is resolved. Keeping the
issue notes private allows the security team to freely discuss attack
methods, attack tools, and other related private issues.
=head3 Development of patches
Members of the security team will inspect the report and related code in
detail to produce fixes for supported versions of Perl.
If the team discovers that the reported issue does not meet the team's
criteria at this stage, you will be notified by email and given an
opportunity to respond before the issue is closed.
The team may discuss potential fixes with you or provide you with
patches for testing purposes during this time frame.
=head3 The CVE is drafted
Once an issue is fully confirmed and a potential fix has been found,
the security team will communicate with the
L<CPAN Security Group CNA|https://security.metacpan.org/>.
Details like the range of vulnerable Perl versions and identities
of the people that discovered the flaw need to be collected.
The security team may ask you to clarify the exact name we should use
when crediting discovery of the issue. The
L</Vulnerability credit and bounties> section of this document
explains our preferred format for this credit.
=head3 Pre-release notifications
When the security team is satisfied that the fix for a security issue
is ready to release publicly, a pre-release notification announcement
is sent to the L<Openwall Distros List|https://oss-security.openwall.org/wiki/mailing-lists/distros>.
Additional other repackagers are notified.
NOTE: Any embargoed information sent to the Openwall Distros List
expires within 2 weeks of disclosure to that location.
This pre-release announcement includes a list of Perl versions that
are affected by the flaw, an analysis of the risks to users, patches
the security team has produced, and any information about mitigations
or backporting fixes to older versions of Perl that the security team
has available.
The pre-release announcement will include a specific target date
when the issue will be announced publicly. The time frame between
the pre-release announcement and the release date allows redistributors
to prepare and test their own updates and announcements. During this
period the vulnerability details and fixes are embargoed (see L</Embargo Period> )
and should not be shared publicly. This L</Embargo Period> may be extended further if
problems are discovered during testing.
You will be sent the portions of pre-release announcements that are
relevant to the specific issue you reported. This email will include
the target release date. Additional updates will be sent if the
target release date changes.
=head3 Pre-release testing
The Perl security team does not directly produce official Perl
releases. The team releases security fixes by placing commits
in Perl's public git repository and sending announcements.
Many users and redistributors prefer using official Perl releases
rather than applying patches to an older release. The security
team works with Perl's release managers to make this possible.
New official releases of Perl are generally produced and tested
on private systems during the pre-release L</Embargo Period>.
=head3 Release of fixes and announcements
The L</Embargo Period> ends when the security fixes are committed to Perl's
public git repository. Announcements will be sent to the
L<perl5-porters|https://lists.perl.org/list/perl5-porters.html> and
L<oss-security|https://oss-security.openwall.org/wiki/mailing-lists/oss-security>
mailing lists.
If official Perl releases are ready, they will be published at this time
and announced on the L<perl5-porters|https://lists.perl.org/list/perl5-porters.html>
mailing list.
The security team will send a follow-up notification to everyone that
participated in the pre-release L</Embargo Period> once the release process is
finished. Vulnerability reporters and Perl redistributors should not publish
their own announcements or fixes until the Perl security team's release process
is complete.
=head2 Publicly known and zero-day security issues
The security team's vulnerability remediation workflow assumes that issues
are reported privately and kept secret until they are resolved. This isn't
always the case and information occasionally leaks out before a fix is ready.
In these situations the team must decide whether operating in secret increases
or decreases the risk to users of Perl. In some cases being open about
the risk a security issue creates will allow users to defend against it,
in other cases calling attention to an unresolved security issue will
make it more likely to be misused.
=head3 Zero-day security issues
If an unresolved critical security issue in Perl is being actively abused to
attack systems the security team will send out announcements as rapidly as
possible with any mitigations the team has available.
Perl's public defect tracker will be used to handle the issue so that additional
information, fixes, and CVE IDs are visible to affected users as rapidly as
possible.
=head3 Other leaks of security issue information
Depending on the prominence of the information revealed about a security
issue and the issue's risk of becoming a zero-day attack, the security team may
skip all or part of its normal remediation workflow.
If the security team learns of a significant security issue after it has been
identified and resolved in Perl's public issue tracker, the team will
request a CVE ID and send an announcement to inform users.
=head2 Vulnerability credit and bounties
The Perl project appreciates the effort security researchers invest in making
Perl safe and secure.
Since much of this work is hidden from the public, crediting researchers
publicly is an important part of the vulnerability remediation process.
=head3 Credits in vulnerability announcements
When security issues are fixed we will attempt to credit the specific
researcher(s) that discovered the flaw in our announcements.
Credits are announced using the researcher's preferred full name.
If the researcher's contributions were funded by a specific company or
part of an organized vulnerability research project, we will include
a short name for this group at the researcher's request.
Perl's announcements are written in the English language using the 7bit
ASCII character set to be reproducible in a variety of formats. We
do not include hyperlinks, domain names or marketing material with these
acknowledgments.
In the event that proper credit for vulnerability discovery cannot be
established or there is a disagreement between the Perl security team
and the researcher about how the credit should be given, it will be
omitted from announcements.
=head3 Bounties for Perl vulnerabilities
The Perl project is a non-profit volunteer effort. We do not provide
any monetary rewards for reporting security issues in Perl.
=head2 Embargo Period
In the context of Perl's coordinated vulnerability disclosure process, an "embargo"
refers to the period of time during which information about a reported vulnerability
is kept confidential. This embargo begins when a security issue is reported to the
Perl security team and lasts until a fix has been developed and a fix is provided
in a public location.
The purpose of the embargo is to allow the security team to work on a fix
and prepare a coordinated release without the risk of the vulnerability being
exploited or disclosed prematurely. This helps ensure that users of Perl
and its modules are protected from potential attacks while the security
issue is being addressed.
Embargo lengths can vary depending on the complexity of the issue and the
time required to develop a fix. The security team will communicate
the expected duration of the embargo to the reporter and any other
parties involved in the process.
As a goal, the security team aims to keep the total embargo period to less
than 60 days. This may be extended due to the following factors:
=over 4
=item *
The complexity of the issue
=item *
The time required to develop a fix
=item *
The need for additional testing or validation
=item *
The availability of resources to address the issue
=item *
Public holidays which might affect the ability of end users to apply the fix.
=back
During this period:
=over 4
=item *
Details of the vulnerability are shared only with a restricted group of trusted contributors
(such as core maintainers, toolchain maintainers, and packagers), solely for the purpose
of preparing and testing a fix.
=item *
Reporters are asked not to disclose the issue publicly or share details with third parties
until the embargo is lifted.
=item *
The duration of the embargo may vary depending on the severity and complexity of the issue,
but typically lasts until the relevant security patch is released and announced.
=item *
Breaking the embargo — by prematurely disclosing details — undermines the coordinated
disclosure process and can hinder the coordinated effort to protect users effectively.
=back
The Perl security team strives to resolve vulnerabilities promptly and encourages all parties
to respect the embargo period to help protect users and downstream distributions.
=head2 Example Release Process
This section provides an example of how a security issue reported by a third
party might be handled by the Perl security team, from the initial report to
the final release.
=head3 Step 1: Reporting the Vulnerability
A security researcher discovers a vulnerability in the Perl interpreter that
allows an attacker to cause a denial of service under specific conditions. The
researcher emails the details of the issue to
L<perl-security@perl.org|mailto:perl-security@perl.org>, including a
proof-of-concept script and a description of the impact.
=head3 Step 2: Initial Response
Within 72 hours, the security team acknowledges receipt of the report and
confirms that the issue is under investigation. The researcher is informed of
the expected timeline for triage.
=head3 Step 3: Initial Triage
The security team reproduces the issue using the provided proof-of-concept and
determines that it meets the criteria for handling as a security issue. One or
more CVEs are reserved in coordination with the
L<CPAN Security Group CNA|https://security.metacpan.org/2025/02/25/cpansec-is-cna-for-perl-and-cpan.html>.
The team notifies the researcher referencing the CVE IDs.
=head3 Step 4: Development of a Fix
The security team analyzes the affected code and develops a patch to address
the vulnerability. The patch is tested against various scenarios to ensure it
resolves the issue without introducing regressions. The researcher is invited
to test the patch privately and provide feedback.
=head3 Step 5: Pre-Release Notification
The security team prepares a pre-release notification, including details of
the vulnerability, the affected Perl versions, and the patch. This notification
is sent to major redistributors of Perl under embargo, giving them time to
prepare their own updates.
=head3 Step 6: Pre-Release Testing
During the remaining embargo period, pre-notified redistributors prepare packages
for release and test the patch to ensure compatibility with their systems.
=head3 Step 7: Public Release
On the scheduled release date, the patch is committed to Perl's public git
repository. An official announcement is sent to the
L<perl5-porters|https://lists.perl.org/list/perl5-porters.html> and
L<oss-security|https://oss-security.openwall.org/wiki/mailing-lists/oss-security>
mailing lists. If applicable, a new Perl release containing the fix is
published.
The security team will notify CPAN Security Group CNA to publish the CVE.
=head3 Step 8: Vendor and Third-Party Updates
Vendors and third-party maintainers incorporate the patch or updated Perl
release into their distributions. The security team follows up with all
parties involved to ensure the issue is resolved and users are protected.
=cut
|