Bugzilla – Bug 961528
VUL-0: CVE-2015-8607: perl: Taint propagation flaw in canonpath()
Last modified: 2016-06-03 14:05:35 UTC
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8607.html David Golden of MongoDB discovered that File::Spec::canonpath() in Perl returned untainted strings even if passed tainted input. This defect undermines taint propagation, which is sometimes used to ensure that unvalidated user input does not reach sensitive code. Bug: https://rt.perl.org/Public/Bug/Display.html?id=126862 Fix is in commit b6307f728a4f842a54ea96959e386c7daa92ece1 openSUSE 13.2 and Factory only. References: https://bugzilla.redhat.com/show_bug.cgi?id=1293272 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8607 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8607.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810719 http://www.debian.org/security/2016/dsa-3441 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607
bugbot adjusting priority
0b6f93036de171c12ba95d415e264d9cf7f4e1fd actually
openSUSE-SU-2016:0881-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 928292,961528,967082 CVE References: CVE-2015-8607,CVE-2016-2381 Sources used: openSUSE 13.2 (src): perl-5.20.1-3.1
13.2 released