CVE-2015-8607
Published: 13 January 2016
The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
Notes
Author | Note |
---|---|
mdeslaur | introduced in perl 5.20.0 introduced in libfile-spec-perl 3.47 |
Priority
CVSS 3 base score: 7.3
Status
Package | Release | Status |
---|---|---|
libfile-spec-perl Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(3.3300-1build2)
|
trusty |
Does not exist
(trusty was not-affected [3.4000-1ubuntu2])
|
|
upstream |
Needs triage
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
perl Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(5.14.2-6ubuntu2.4)
|
trusty |
Not vulnerable
(5.18.2-2ubuntu1)
|
|
upstream |
Needs triage
|
|
vivid |
Released
(5.20.2-2ubuntu0.1)
|
|
wily |
Released
(5.20.2-6ubuntu0.1)
|
|
Patches: upstream: http://perl5.git.perl.org/perl.git/commit/0b6f93036de171c12ba95d415e264d9cf7f4e1fd |