CVE-2015-8607

Published: 13 January 2016

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

Priority

Medium

CVSS 3 base score: 7.3

Status

Package Release Status
libfile-spec-perl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [3.4000-1ubuntu2])
perl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(5.22.1-4)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(5.18.2-2ubuntu1)
Patches:
Upstream: http://perl5.git.perl.org/perl.git/commit/0b6f93036de171c12ba95d415e264d9cf7f4e1fd