compartments are not supported as
security mechanisms. The Perl parser is not designed to evaluate
untrusted code.
=head3 Use of the C and C
pack templates
These templates are unsafe by design.
=head3 Stack not reference-counted issues
These bugs typically present as use-after-free errors or as assertion
failures on the type of a C. Stack not reference-counted
crashes usually occur because code is both modifying a reference or
glob and using the values referenced by that glob or reference.
This type of bug is a long standing issue with the Perl interpreter
that seldom occurs in normal code. Examples of this type of bug
generally assume that attacker-supplied code will be evaluated by
the Perl interpreter.
=head3 Thawing attacker-supplied data with L
L is designed to be a very fast serialization format.
It is not designed to be safe for deserializing untrusted inputs.
=head3 Using attacker supplied L databases
The L module is not intended for use with untrusted SDBM
databases.
=head3 Badly encoded UTF-8 flagged scalars
This type of bug occurs when the C<:utf8> PerlIO layer is used to
read badly encoded data, or other mechanisms are used to directly
manipulate the UTF-8 flag on an SV.
A badly encoded UTF-8 flagged SV is not a valid SV. Code that
creates SV's in this fashion is corrupting Perl's internal state.
=head3 Issues that exist only in blead, or in a release candidate
The blead branch and Perl release candidates do not receive security
support. Security defects that are present only in pre-release
versions of Perl are handled through the normal bug reporting and
resolution process.
=head3 CPAN modules or other Perl project resources
The Perl security team is focused on the Perl interpreter and modules
maintained in the core Perl codebase. The team has no special access
to fix CPAN modules, applications written in Perl, Perl project websites,
Perl mailing lists or the Perl IRC servers.
=head3 Emulated POSIX behaviors on Windows systems
The Perl interpreter attempts to emulate C, C, C
and other POSIX behaviors on Windows systems. This emulation has many
quirks that are extensively documented in Perl's public issue tracker.
Changing these behaviors would cause significant disruption for existing
users on Windows.
=head2 Bugs that require special categorization
Some bugs in the Perl interpreter occur in areas of the codebase that are
both security sensitive and prone to failure during normal usage.
=head3 Regular expressions
Untrusted regular expressions are generally safe to compile and match against
with several caveats. The following behaviors of Perl's regular expression
engine are the developer's responsibility to constrain.
The evaluation of untrusted regular expressions while C