You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've been away from perl development for many, many years, but I'm wondering if there is really missed any possibility to check installed CPAN modules for reported security problems and update the modules if fixes are applied to an updated module?!
The text was updated successfully, but these errors were encountered:
Well there is CVE and in Java/Maven and Node/NPM there is at least one utitlity which checks the versions against reported vulnerabilities in CVE DBs. Also Github has the feature to report repository owners if there is a vulnerable version used in the NPM-based-project-repo.
Hi,
I am here after 2 years, I think it could be done creating an interface to various CVE database sites ( i.e https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=perl, the "keyword" parameter can be modified though input) and, foreach module installed search the url, a practical example would be something like:
foreach ( list_of_modules){
if (is found_link in ("https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=" . $) ){
do_something; # like upgrade the $
}
Maybe I'll write an article on it, I was thinking also about a script which check automatically if every new module on cpan uses the "strict" and "warning" (using the raw "source" link).
I've been away from perl development for many, many years, but I'm wondering if there is really missed any possibility to check installed CPAN modules for reported security problems and update the modules if fixes are applied to an updated module?!
The text was updated successfully, but these errors were encountered: