{"id":"MGASA-2016-0027","summary":"Updated perl and perl-PathTools packages fix security vulnerability","details":"It was reported that File::Spec::canonpath() routine returns untainted strings\neven if passed tainted input.  This defect undermines the guarantee of taint\npropagation, which is sometimes used to ensure that unvalidated user input does\nnot reach sensitive code (CVE-2015-8607).\n","modified":"2026-04-16T06:24:26.282081513Z","published":"2016-01-20T17:53:26Z","upstream":["CVE-2015-8607"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0027.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17475"},{"type":"WEB","url":"https://www.debian.org/security/2016/dsa-3441"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2016-January/175494.html"}],"affected":[{"package":{"name":"perl","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/perl?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.20.1-8.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0027.json"}},{"package":{"name":"perl-PathTools","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/perl-PathTools?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.470.0-7.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0027.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}