Security Advisories (1)
CVE-2024-10224
(2024-11-19)
Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
- https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529
- https://www.cve.org/CVERecord?id=CVE-2024-10224
- https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
- https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html
- https://ubuntu.com/security/CVE-2024-10224
No POD found for TestB.pm.
Time to read the source?
Module Install Instructions
To install Module::ScanDeps, copy and paste the appropriate command in to your terminal.
cpanm Module::ScanDeps
perl -MCPAN -e shell
install Module::ScanDeps
For more information on module installation, please visit the detailed CPAN module installation guide.