perl: ensure File::Spec::canonpath() preserves taint [CVE-2015-8607] 2267/head
authorJo-Philipp Wich <jow@openwrt.org>
Thu, 14 Jan 2016 11:17:56 +0000 (12:17 +0100)
committerJo-Philipp Wich <jow@openwrt.org>
Thu, 14 Jan 2016 11:17:56 +0000 (12:17 +0100)
commitf73e358558f9a48f731938481cea9a769be0855b
treebf0d51ae7a05579c93fd5f6bff7fd44ac7c39614
parent6e9cf99476eb5e0d316f8008210f9d5d60602b90
perl: ensure File::Spec::canonpath() preserves taint [CVE-2015-8607]

Beginning in PathTools 3.47 and/or perl 5.20.0, the File::Spec::canonpath()
routine returned untained strings even if passed tainted input. This defect
undermines the guarantee of taint propagation, which is sometimes used to
ensure that unvalidated user input does not reach sensitive code.

This defect was found and reported by David Golden of MongoDB, and a patch
was provided by Tony Cook.

References:

 * https://rt.perl.org/Public/Bug/Display.html?id=126862
 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
lang/perl/Makefile
lang/perl/patches/020-host-libc-dir-moved-debian+derivatives.patch
lang/perl/patches/110-always_use_miniperl.patch
lang/perl/patches/700-tie_fetch_count_t-handle_missing_crypt.patch
lang/perl/patches/710-threads_join-skip_ps_on_busybox.patch
lang/perl/patches/900-CVE-2015-8607.patch [new file with mode: 0644]