[Catalyst] [Fwd: [rt-users] Security vulnerability in RT 3.0 and up]

Dave Rolsky autarch at urth.org
Tue Jun 24 09:17:15 BST 2008


On Mon, 23 Jun 2008, Lance A. Brown wrote:

> Hmmmm.   Is this something Catalyst needs to worry about?

The case to tickle this particular bug is that you need to pass bad UTF8 
to a sub that's in the call chain and then generate a Devel::StackTrace 
object and then try to stringify that object.

Also, this only affects some versions of Perl.

So, the short answer is that this is unlikely to be a problem for most 
applications out there. RT, amazingly, happened to do exactly the sequence 
of things I described above.

It certainly will not hurt to upgrade your copy of Devel::StackTrace, 
however.


-dave

/*==========================
VegGuide.Org
Your guide to all that's veg
==========================*/



More information about the Catalyst mailing list