perlsecpolicy - Perl security report handling policy
The Perl project takes security issues seriously.
The responsibility for handling security reports in a timely and effective manner has been delegated to a security team composed of a subset of the Perl core developers.
This document describes how the Perl security team operates and how the team evaluates new security reports.
If you believe you have found a security vulnerability in the Perl interpreter or modules maintained in the core Perl codebase, email the details to perl-security@perl.org. This address is a closed membership mailing list monitored by the Perl security team.
You should receive an initial response to your report within 72 hours. If you do not receive a response in that time, please contact the Perl Steering Council.
When members of the security team reply to your messages, they will generally include the perl-security@perl.org address in the "To" or "CC" fields of the response. This allows all of the security team to follow the discussion and chime in as needed. Use the "Reply-all" functionality of your email client when you send subsequent responses so that the entire security team receives the message.
The security team will evaluate your report and make an initial determination of whether it is likely to fit the scope of issues the team handles. General guidelines about how this is determined are detailed in the "WHAT ARE SECURITY ISSUES" section.
If your report meets the team's criteria, you will be provided the issue's CVE ID(s). Issue identifiers have the form CVE-YYYY-NNNNN, where YYYY is the year the CVE was reported, and NNNNN is a unique number. Include this identifier with any subsequent messages you send.
The security team will send periodic updates about the status of your issue and guide you through any further action that is required to complete the vulnerability remediation process. The stages vulnerabilities typically go through are explained in the "HOW WE DEAL WITH SECURITY ISSUES" section.
A vulnerability is a behavior of a software system that compromises the system's expected confidentiality, integrity or availability protections.
A security issue is a bug in one or more specific components of a software system that creates a vulnerability.
Software written in the Perl programming language is typically composed of many layers of software written by many different groups. It can be very complicated to determine which specific layer of a complex real-world application was responsible for preventing a vulnerable behavior, but this is an essential part of fixing the vulnerability.
The Perl security team handles security issues in:
The Perl interpreter
The Perl modules shipped with the interpreter that are developed in the core Perl repository
The command line tools shipped with the interpreter that are developed in the core Perl repository
Files under the cpan/ directory in Perl's repository and release tarballs are developed and maintained independently. The Perl security team does not directly handle security issues for these modules, but since this code is bundled with Perl, we will assist in forwarding the issue to the relevant maintainer(s) and you can still report these issues to us in secrecy.
Perl is designed to be a fast and flexible general purpose programming language. The Perl interpreter and Perl modules make writing safe and secure applications easy, but they do have limitations.
As a general rule, a bug in Perl needs to meet all of the following criteria to be considered a security issue:
The vulnerable behavior is not mentioned in Perl's documentation or public issue tracker.
The vulnerable behavior is not implied by an expected behavior.
The vulnerable behavior is not a generally accepted limitation of the implementation.
The vulnerable behavior is likely to be exposed to attack in otherwise secure applications written in Perl.
The vulnerable behavior provides a specific tangible benefit to an attacker that triggers the behavior.
There are certain categories of bugs that are frequently reported to the security team that do not meet the criteria listed above.
The following is a list of commonly reported bugs that are not handled as security issues.
The Perl parser is not designed to evaluate untrusted code. If your application requires the evaluation of untrusted code, it should rely on an operating system level sandbox for its security.
Excessive recursion is often caused by code that does not enforce limits on inputs. The Perl interpreter assumes limits on recursion will be enforced by the application.
Common Perl constructs such as pack
, the x
operator, and regular expressions accept numeric quantifiers that control how much memory will be allocated to store intermediate values or results. If you allow an attacker to supply these quantifiers and consume all available memory, the Perl interpreter will not prevent it.
Opcode restrictions and Safe compartments are not supported as security mechanisms. The Perl parser is not designed to evaluate untrusted code.
p
and P
pack templatesThese templates are unsafe by design.
These bugs typically present as use-after-free errors or as assertion failures on the type of a SV
. Stack not reference-counted crashes usually occur because code is both modifying a reference or glob and using the values referenced by that glob or reference.
This type of bug is a long standing issue with the Perl interpreter that seldom occurs in normal code. Examples of this type of bug generally assume that attacker-supplied code will be evaluated by the Perl interpreter.
Storable is designed to be a very fast serialization format. It is not designed to be safe for deserializing untrusted inputs.
The SDBM_File module is not intended for use with untrusted SDBM databases.
This type of bug occurs when the :utf8
PerlIO layer is used to read badly encoded data, or other mechanisms are used to directly manipulate the UTF-8 flag on an SV.
A badly encoded UTF-8 flagged SV is not a valid SV. Code that creates SV's in this fashion is corrupting Perl's internal state.
The blead branch and Perl release candidates do not receive security support. Security defects that are present only in pre-release versions of Perl are handled through the normal bug reporting and resolution process.
The Perl security team is focused on the Perl interpreter and modules maintained in the core Perl codebase. The team has no special access to fix CPAN modules, applications written in Perl, Perl project websites, Perl mailing lists or the Perl IRC servers.
The Perl interpreter attempts to emulate fork
, system
, exec
and other POSIX behaviors on Windows systems. This emulation has many quirks that are extensively documented in Perl's public issue tracker. Changing these behaviors would cause significant disruption for existing users on Windows.
Some bugs in the Perl interpreter occur in areas of the codebase that are both security sensitive and prone to failure during normal usage.
Untrusted regular expressions are generally safe to compile and match against with several caveats. The following behaviors of Perl's regular expression engine are the developer's responsibility to constrain.
The evaluation of untrusted regular expressions while use re 'eval';
is in effect is never safe.
Regular expressions are not guaranteed to compile or evaluate in any specific finite time frame.
Regular expressions may consume all available system memory when they are compiled or evaluated.
Regular expressions may cause excessive recursion that halts the perl interpreter.
As a general rule, do not expect Perl's regular expression engine to be resistant to denial of service attacks.
These modules rely on external libraries to interact with database files.
Bugs caused by reading and writing these file formats are generally caused by the underlying library implementation and are not security issues in Perl.
Bugs where Perl mishandles unexpected valid return values from the underlying libraries may qualify as security issues in Perl.
The perl interpreter is reasonably robust to algorithmic complexity attacks. It is not immune to them.
Algorithmic complexity bugs that depend on the interpreter processing extremely large amounts of attacker supplied data are not generally handled as security issues.
See "Algorithmic Complexity Attacks" in perlsec for additional information.
The Perl security team follows responsible disclosure practices. Security issues are kept secret until a fix is readily available for most users. This minimizes inherent risks users face from vulnerabilities in Perl.
Hiding problems from the users temporarily is a necessary trade-off to keep them safe. Hiding problems from users permanently is not the goal.
When you report a security issue privately to the perl-security@perl.org contact address, we normally expect you to follow responsible disclosure practices in the handling of the report. If you are unable or unwilling to keep the issue secret until a fix is available to users you should state this clearly in the initial report.
The security team's vulnerability remediation workflow is intended to be as open and transparent as possible about the state of your security report.
New vulnerability reports will receive an initial reply within 72 hours from the time they arrive at the security team's mailing list. If you do not receive any response in that time, contact the Perl Steering Council.
The initial response sent by the security team will confirm your message was received and provide an estimated time frame for the security team's triage analysis.
The security team will evaluate the report and determine whether or not it is likely to meet the criteria for handling as a security issue.
The security team aims to complete the initial report triage within two weeks' time. Complex issues that require significant discussion or research may take longer.
If the security report cannot be reproduced or does not meet the team's criteria for handling as a security issue, you will be notified by email and given an opportunity to respond.
Security reports that pass initial triage analysis are turned into CVEs. When a report progresses to this point, one or more CVEs are reserved by the security team. Issue identifiers have the form CVE-YYYY-NNNNN, where YYYY is the year the CVE was reported, and NNNNN is a unique number. The CVE will be used in any subsequent communications about the issue.
The assignment of these IDs do not confirm that a security report represents a vulnerability in Perl. Many reports require further analysis to reach that determination. The vulnerability should not be discussed publicly at this stage.
An internal ticket will also be opened. These identifiers have the format perl-security#NNN or Perl/perl-security#NNN.
Issues in the security team's private tracker are used to collect details about the problem and track progress towards a resolution. These notes and other details are not made public when the issue is resolved. Keeping the issue notes private allows the security team to freely discuss attack methods, attack tools, and other related private issues.
Members of the security team will inspect the report and related code in detail to produce fixes for supported versions of Perl.
If the team discovers that the reported issue does not meet the team's criteria at this stage, you will be notified by email and given an opportunity to respond before the issue is closed.
The team may discuss potential fixes with you or provide you with patches for testing purposes during this time frame.
Once an issue is fully confirmed and a potential fix has been found, the security team will communicate with the CPAN Security Group CNA.
Details like the range of vulnerable Perl versions and identities of the people that discovered the flaw need to be collected.
The security team may ask you to clarify the exact name we should use when crediting discovery of the issue. The "Vulnerability credit and bounties" section of this document explains our preferred format for this credit.
When the security team is satisfied that the fix for a security issue is ready to release publicly, a pre-release notification announcement is sent to the Openwall Distros List. Additional other repackagers are notified.
NOTE: Any embargoed information sent to the Openwall Distros List expires within 2 weeks of disclosure to that location.
This pre-release announcement includes a list of Perl versions that are affected by the flaw, an analysis of the risks to users, patches the security team has produced, and any information about mitigations or backporting fixes to older versions of Perl that the security team has available.
The pre-release announcement will include a specific target date when the issue will be announced publicly. The time frame between the pre-release announcement and the release date allows redistributors to prepare and test their own updates and announcements. During this period the vulnerability details and fixes are embargoed (see "Embargo Period" ) and should not be shared publicly. This "Embargo Period" may be extended further if problems are discovered during testing.
You will be sent the portions of pre-release announcements that are relevant to the specific issue you reported. This email will include the target release date. Additional updates will be sent if the target release date changes.
The Perl security team does not directly produce official Perl releases. The team releases security fixes by placing commits in Perl's public git repository and sending announcements.
Many users and redistributors prefer using official Perl releases rather than applying patches to an older release. The security team works with Perl's release managers to make this possible.
New official releases of Perl are generally produced and tested on private systems during the pre-release "Embargo Period".
The "Embargo Period" ends when the security fixes are committed to Perl's public git repository. Announcements will be sent to the perl5-porters and oss-security mailing lists.
If official Perl releases are ready, they will be published at this time and announced on the perl5-porters mailing list.
The security team will send a follow-up notification to everyone that participated in the pre-release "Embargo Period" once the release process is finished. Vulnerability reporters and Perl redistributors should not publish their own announcements or fixes until the Perl security team's release process is complete.
The security team's vulnerability remediation workflow assumes that issues are reported privately and kept secret until they are resolved. This isn't always the case and information occasionally leaks out before a fix is ready.
In these situations the team must decide whether operating in secret increases or decreases the risk to users of Perl. In some cases being open about the risk a security issue creates will allow users to defend against it, in other cases calling attention to an unresolved security issue will make it more likely to be misused.
If an unresolved critical security issue in Perl is being actively abused to attack systems the security team will send out announcements as rapidly as possible with any mitigations the team has available.
Perl's public defect tracker will be used to handle the issue so that additional information, fixes, and CVE IDs are visible to affected users as rapidly as possible.
Depending on the prominence of the information revealed about a security issue and the issue's risk of becoming a zero-day attack, the security team may skip all or part of its normal remediation workflow.
If the security team learns of a significant security issue after it has been identified and resolved in Perl's public issue tracker, the team will request a CVE ID and send an announcement to inform users.
The Perl project appreciates the effort security researchers invest in making Perl safe and secure.
Since much of this work is hidden from the public, crediting researchers publicly is an important part of the vulnerability remediation process.
When security issues are fixed we will attempt to credit the specific researcher(s) that discovered the flaw in our announcements.
Credits are announced using the researcher's preferred full name.
If the researcher's contributions were funded by a specific company or part of an organized vulnerability research project, we will include a short name for this group at the researcher's request.
Perl's announcements are written in the English language using the 7bit ASCII character set to be reproducible in a variety of formats. We do not include hyperlinks, domain names or marketing material with these acknowledgments.
In the event that proper credit for vulnerability discovery cannot be established or there is a disagreement between the Perl security team and the researcher about how the credit should be given, it will be omitted from announcements.
The Perl project is a non-profit volunteer effort. We do not provide any monetary rewards for reporting security issues in Perl.
In the context of Perl's coordinated vulnerability disclosure process, an "embargo" refers to the period of time during which information about a reported vulnerability is kept confidential. This embargo begins when a security issue is reported to the Perl security team and lasts until a fix has been developed and a fix is provided in a public location.
The purpose of the embargo is to allow the security team to work on a fix and prepare a coordinated release without the risk of the vulnerability being exploited or disclosed prematurely. This helps ensure that users of Perl and its modules are protected from potential attacks while the security issue is being addressed.
Embargo lengths can vary depending on the complexity of the issue and the time required to develop a fix. The security team will communicate the expected duration of the embargo to the reporter and any other parties involved in the process.
As a goal, the security team aims to keep the total embargo period to less than 60 days. This may be extended due to the following factors:
The complexity of the issue
The time required to develop a fix
The need for additional testing or validation
The availability of resources to address the issue
Public holidays which might affect the ability of end users to apply the fix.
During this period:
Details of the vulnerability are shared only with a restricted group of trusted contributors (such as core maintainers, toolchain maintainers, and packagers), solely for the purpose of preparing and testing a fix.
Reporters are asked not to disclose the issue publicly or share details with third parties until the embargo is lifted.
The duration of the embargo may vary depending on the severity and complexity of the issue, but typically lasts until the relevant security patch is released and announced.
Breaking the embargo — by prematurely disclosing details — undermines the coordinated disclosure process and can hinder the coordinated effort to protect users effectively.
The Perl security team strives to resolve vulnerabilities promptly and encourages all parties to respect the embargo period to help protect users and downstream distributions.
This section provides an example of how a security issue reported by a third party might be handled by the Perl security team, from the initial report to the final release.
A security researcher discovers a vulnerability in the Perl interpreter that allows an attacker to cause a denial of service under specific conditions. The researcher emails the details of the issue to perl-security@perl.org, including a proof-of-concept script and a description of the impact.
Within 72 hours, the security team acknowledges receipt of the report and confirms that the issue is under investigation. The researcher is informed of the expected timeline for triage.
The security team reproduces the issue using the provided proof-of-concept and determines that it meets the criteria for handling as a security issue. One or more CVEs are reserved in coordination with the CPAN Security Group CNA. The team notifies the researcher referencing the CVE IDs.
The security team analyzes the affected code and develops a patch to address the vulnerability. The patch is tested against various scenarios to ensure it resolves the issue without introducing regressions. The researcher is invited to test the patch privately and provide feedback.
The security team prepares a pre-release notification, including details of the vulnerability, the affected Perl versions, and the patch. This notification is sent to major redistributors of Perl under embargo, giving them time to prepare their own updates.
During the remaining embargo period, pre-notified redistributors prepare packages for release and test the patch to ensure compatibility with their systems.
On the scheduled release date, the patch is committed to Perl's public git repository. An official announcement is sent to the perl5-porters and oss-security mailing lists. If applicable, a new Perl release containing the fix is published.
The security team will notify CPAN Security Group CNA to publish the CVE.
Vendors and third-party maintainers incorporate the patch or updated Perl release into their distributions. The security team follows up with all parties involved to ensure the issue is resolved and users are protected.