You can find a full list of changes in the file “perldelta.pod” located in the “pod” directory inside the release and on the web.
Perl v5.18.0 represents approximately 12 months of development since Perl v5.16.0 and contains approximately 400,000 lines of changes across 2,100 files from 113 authors.
Perl continues to flourish into its third decade thanks to a vibrant community of users and developers.
Strawberry Perl 184.108.40.206 is available at http://strawberryperl.com (all editions: MSI, ZIP, PortableZIP for both: 32/64bit MS Windows)
For this quarter, TPF Grants Committee have four different proposals. They invite the Perl Community to comment on the proposals and their relevance to the community. Comments on each grant on their specific page…
- YACT – Yet Another Conference Tool by Torsten Raudssus (Getty)
- rpm.perl.it by Jozef Kutej
- Review of Perl Web Frameworks by Neil Bowers
- Next Release of Pinto With Key Features by Jeffrey Ryan Thalhammer
ack was originally developed to be better than the unix grep (file pattern searcher) command, and as pointed out in the announcement is now trying to focus on going beyond even that.
For more information visit the ack website.
New features include:
- Mobile support (also accessible from https://rt.cpan.org/m)
- Preferred bug tracker information displayed prominently – if the module author wants to use a different tracker it is clearly displayed and linked to
See the announcement for the full list of improvements.
PrePAN provides a place to discuss your modules.
It’s aim is to help with questions like…
- Are there any similar modules?
- I’m not confident about the implementation…
- How can I distribute the module in keeping with CPAN’s conventions?
- I want someone to review my module..
It is recommend that you upgrade as these address the recent rehashing flaw.
Strawberry Perl is a 100% Open Source Perl for Windows that is exactly the same as Perl everywhere else; this includes using modules from CPAN, without the need for binary packages.
The following message concerns a hash-related flaw in perl 5
This issue affects all production versions of perl from 5.8.2 to 5.16.x. It does not affect the upcoming perl 5.18.
In order to prevent an algorithmic complexity attack against its hashing mechanism, perl will sometimes recalculate keys and redistribute the contents of a hash. This mechanism has made perl robust against attacks that have been demonstrated against other systems.
Research by Yves Orton has recently uncovered a flaw in the rehashing code which can result in pathological behavior. This flaw could be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys.
Because using user-provided strings as hash keys is a very common operation, we urge users of perl to update their perl executable as soon as possible.
Updates to address this issue have been pushed to maint-5.8, maint-5.10, maint-5.12, maint-5.14, and maint-5.16 branches today, perl 5.14.4 and 5.16.3 will be released soon, including these fixes. There is no plan to make a new release of any other version.
Vendors* were informed of this problem two weeks ago and are expected to be shipping updates today (or otherwise very soon).
bleadperl is not affected.
This issue has been assigned the identifier CVE-2013-1667.