Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2015-8607

Published: 13 January 2016

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

Notes

AuthorNote
mdeslaur
introduced in perl 5.20.0
introduced in libfile-spec-perl 3.47

Priority

Medium

CVSS 3 base score: 7.3

Status

Package Release Status
libfile-spec-perl
Launchpad, Ubuntu, Debian
precise Not vulnerable
(3.3300-1build2)
trusty Does not exist
(trusty was not-affected [3.4000-1ubuntu2])
upstream Needs triage

vivid Does not exist

wily Does not exist

perl
Launchpad, Ubuntu, Debian
precise Not vulnerable
(5.14.2-6ubuntu2.4)
trusty Not vulnerable
(5.18.2-2ubuntu1)
upstream Needs triage

vivid
Released (5.20.2-2ubuntu0.1)
wily
Released (5.20.2-6ubuntu0.1)
Patches:
upstream: http://perl5.git.perl.org/perl.git/commit/0b6f93036de171c12ba95d415e264d9cf7f4e1fd