diff --git a/pod/perl.pod b/pod/perl.pod index c5ca732bbb44..6c475fd13b36 100644 --- a/pod/perl.pod +++ b/pod/perl.pod @@ -187,9 +187,12 @@ aux h2ph h2xs perlbug pl2pm pod2html pod2man splain xsubpp perl5392delta Perl changes in version 5.39.2 perl5391delta Perl changes in version 5.39.1 perl5390delta Perl changes in version 5.39.0 + perl5381delta Perl changes in version 5.38.1 perl5380delta Perl changes in version 5.38.0 + perl5362delta Perl changes in version 5.36.2 perl5361delta Perl changes in version 5.36.1 perl5360delta Perl changes in version 5.36.0 + perl5342delta Perl changes in version 5.34.2 perl5341delta Perl changes in version 5.34.1 perl5340delta Perl changes in version 5.34.0 perl5321delta Perl changes in version 5.32.1 diff --git a/pod/perl5342delta.pod b/pod/perl5342delta.pod new file mode 100644 index 000000000000..6015b2447a62 --- /dev/null +++ b/pod/perl5342delta.pod @@ -0,0 +1,109 @@ +=encoding utf8 + +=head1 NAME + +perl5342delta - what is new for perl v5.34.2 + +=head1 DESCRIPTION + +This document describes differences between the 5.34.1 release and the 5.34.2 +release. + +If you are upgrading from an earlier release such as 5.34.0, first read +L, which describes differences between 5.34.0 and 5.34.1. + +=head1 Security + +This release fixes the following security issues. + +=head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property + +This vulnerability was reported directly to the Perl security team by +Nathan Mills C. + +A crafted regular expression when compiled by perl 5.30.0 through +5.38.0 can cause a one-byte attacker controlled buffer overflow in a +heap allocated buffer. + +=head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability + +This vulnerability was reported to the Intel Product Security Incident +Response Team (PSIRT) by GitHub user ycdxsb +L. PSIRT then +reported it to the Perl security team. + +Perl for Windows relies on the system path environment variable to +find the shell (C). When running an executable which uses +Windows Perl interpreter, Perl attempts to find and execute C +within the operating system. However, due to path search order issues, +Perl initially looks for cmd.exe in the current working directory. + +An attacker with limited privileges can exploit this behavior by +placing C in locations with weak permissions, such as +C. By doing so, when an administrator attempts to use +this executable from these compromised locations, arbitrary code can +be executed. + +=head1 Acknowledgements + +Perl 5.34.2 represents approximately 1 month of development since Perl +5.34.1 and contains approximately 3,700 lines of changes across 40 files +from 4 authors. + +Excluding auto-generated files, documentation and release tools, there were +approximately 2,800 lines of changes to 9 .pm, .t, .c and .h files. + +Perl continues to flourish into its fourth decade thanks to a vibrant +community of users and developers. The following people are known to have +contributed the improvements that became Perl 5.34.2: + +Karl Williamson, Paul Evans, Steve Hay, Tony Cook. + +The list above is almost certainly incomplete as it is automatically +generated from version control history. In particular, it does not include +the names of the (very much appreciated) contributors who reported issues to +the Perl bug tracker. + +Many of the changes included in this version originated in the CPAN modules +included in Perl's core. We're grateful to the entire CPAN community for +helping Perl to flourish. + +For a more complete list of all of Perl's historical contributors, please +see the F file in the Perl source distribution. + +=head1 Reporting Bugs + +If you find what you think is a bug, you might check the perl bug database +at L. There may also be information at +L, the Perl Home Page. + +If you believe you have an unreported bug, please open an issue at +L. Be sure to trim your bug down to a +tiny but sufficient test case. + +If the bug you are reporting has security implications which make it +inappropriate to send to a public issue tracker, then see +L +for details of how to report the issue. + +=head1 Give Thanks + +If you wish to thank the Perl 5 Porters for the work we had done in Perl 5, +you can do so by running the C program: + + perlthanks + +This will send an email to the Perl 5 Porters list with your show of thanks. + +=head1 SEE ALSO + +The F file for an explanation of how to view exhaustive details on +what changed. + +The F file for how to build Perl. + +The F file for general stuff. + +The F and F files for copyright information. + +=cut diff --git a/pod/perl5362delta.pod b/pod/perl5362delta.pod new file mode 100644 index 000000000000..aa6d5a641201 --- /dev/null +++ b/pod/perl5362delta.pod @@ -0,0 +1,109 @@ +=encoding utf8 + +=head1 NAME + +perl5362delta - what is new for perl v5.36.2 + +=head1 DESCRIPTION + +This document describes differences between the 5.36.1 release and the 5.36.2 +release. + +If you are upgrading from an earlier release such as 5.36.0, first read +L, which describes differences between 5.36.0 and 5.36.1. + +=head1 Security + +This release fixes the following security issues. + +=head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property + +This vulnerability was reported directly to the Perl security team by +Nathan Mills C. + +A crafted regular expression when compiled by perl 5.30.0 through +5.38.0 can cause a one-byte attacker controlled buffer overflow in a +heap allocated buffer. + +=head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability + +This vulnerability was reported to the Intel Product Security Incident +Response Team (PSIRT) by GitHub user ycdxsb +L. PSIRT then +reported it to the Perl security team. + +Perl for Windows relies on the system path environment variable to +find the shell (C). When running an executable which uses +Windows Perl interpreter, Perl attempts to find and execute C +within the operating system. However, due to path search order issues, +Perl initially looks for cmd.exe in the current working directory. + +An attacker with limited privileges can exploit this behavior by +placing C in locations with weak permissions, such as +C. By doing so, when an administrator attempts to use +this executable from these compromised locations, arbitrary code can +be executed. + +=head1 Acknowledgements + +Perl 5.36.2 represents approximately 1 month of development since Perl +5.36.1 and contains approximately 2,300 lines of changes across 38 files +from 4 authors. + +Excluding auto-generated files, documentation and release tools, there were +approximately 1,400 lines of changes to 8 .pm, .t, .c and .h files. + +Perl continues to flourish into its fourth decade thanks to a vibrant +community of users and developers. The following people are known to have +contributed the improvements that became Perl 5.36.2: + +Karl Williamson, Paul Evans, Steve Hay, Tony Cook. + +The list above is almost certainly incomplete as it is automatically +generated from version control history. In particular, it does not include +the names of the (very much appreciated) contributors who reported issues to +the Perl bug tracker. + +Many of the changes included in this version originated in the CPAN modules +included in Perl's core. We're grateful to the entire CPAN community for +helping Perl to flourish. + +For a more complete list of all of Perl's historical contributors, please +see the F file in the Perl source distribution. + +=head1 Reporting Bugs + +If you find what you think is a bug, you might check the perl bug database +at L. There may also be information at +L, the Perl Home Page. + +If you believe you have an unreported bug, please open an issue at +L. Be sure to trim your bug down to a +tiny but sufficient test case. + +If the bug you are reporting has security implications which make it +inappropriate to send to a public issue tracker, then see +L +for details of how to report the issue. + +=head1 Give Thanks + +If you wish to thank the Perl 5 Porters for the work we had done in Perl 5, +you can do so by running the C program: + + perlthanks + +This will send an email to the Perl 5 Porters list with your show of thanks. + +=head1 SEE ALSO + +The F file for an explanation of how to view exhaustive details on +what changed. + +The F file for how to build Perl. + +The F file for general stuff. + +The F and F files for copyright information. + +=cut diff --git a/pod/perl5381delta.pod b/pod/perl5381delta.pod new file mode 100644 index 000000000000..76ee623837bf --- /dev/null +++ b/pod/perl5381delta.pod @@ -0,0 +1,109 @@ +=encoding utf8 + +=head1 NAME + +perl5381delta - what is new for perl v5.38.1 + +=head1 DESCRIPTION + +This document describes differences between the 5.38.0 release and the 5.38.1 +release. + +If you are upgrading from an earlier release such as 5.37.0, first read +L, which describes differences between 5.37.0 and 5.38.0. + +=head1 Security + +This release fixes the following security issues. + +=head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property + +This vulnerability was reported directly to the Perl security team by +Nathan Mills C. + +A crafted regular expression when compiled by perl 5.30.0 through +5.38.0 can cause a one-byte attacker controlled buffer overflow in a +heap allocated buffer. + +=head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability + +This vulnerability was reported to the Intel Product Security Incident +Response Team (PSIRT) by GitHub user ycdxsb +L. PSIRT then +reported it to the Perl security team. + +Perl for Windows relies on the system path environment variable to +find the shell (C). When running an executable which uses +Windows Perl interpreter, Perl attempts to find and execute C +within the operating system. However, due to path search order issues, +Perl initially looks for cmd.exe in the current working directory. + +An attacker with limited privileges can exploit this behavior by +placing C in locations with weak permissions, such as +C. By doing so, when an administrator attempts to use +this executable from these compromised locations, arbitrary code can +be executed. + +=head1 Acknowledgements + +Perl 5.38.1 represents approximately 5 months of development since Perl +5.38.0 and contains approximately 6,100 lines of changes across 34 files +from 4 authors. + +Excluding auto-generated files, documentation and release tools, there were +approximately 1,300 lines of changes to 9 .pm, .t, .c and .h files. + +Perl continues to flourish into its fourth decade thanks to a vibrant +community of users and developers. The following people are known to have +contributed the improvements that became Perl 5.38.1: + +Karl Williamson, Paul Evans, Steve Hay, Tony Cook. + +The list above is almost certainly incomplete as it is automatically +generated from version control history. In particular, it does not include +the names of the (very much appreciated) contributors who reported issues to +the Perl bug tracker. + +Many of the changes included in this version originated in the CPAN modules +included in Perl's core. We're grateful to the entire CPAN community for +helping Perl to flourish. + +For a more complete list of all of Perl's historical contributors, please +see the F file in the Perl source distribution. + +=head1 Reporting Bugs + +If you find what you think is a bug, you might check the perl bug database +at L. There may also be information at +L, the Perl Home Page. + +If you believe you have an unreported bug, please open an issue at +L. Be sure to trim your bug down to a +tiny but sufficient test case. + +If the bug you are reporting has security implications which make it +inappropriate to send to a public issue tracker, then see +L +for details of how to report the issue. + +=head1 Give Thanks + +If you wish to thank the Perl 5 Porters for the work we had done in Perl 5, +you can do so by running the C program: + + perlthanks + +This will send an email to the Perl 5 Porters list with your show of thanks. + +=head1 SEE ALSO + +The F file for an explanation of how to view exhaustive details on +what changed. + +The F file for how to build Perl. + +The F file for general stuff. + +The F and F files for copyright information. + +=cut