aboutsummaryrefslogtreecommitdiff
path: root/lang/perl/patches/110-always_use_miniperl.patch
Commit message (Collapse)AuthorAge
* perl: update to version 5.38.0Andy Syam2023-11-22
| | | | | | | | | | | | | | | removed some sources to download perl. I believe I only need one source to download perl at https://www.cpan.org/src/5.0. I see some Linux distributions use that source to download. change the position of PKG_MAINTAINER to make it neater and prettier perform a patch refresh removes some patches that have been applied in perl-5.38.0 as well as patches that are no longer used in perl-5.38.0 added one patch Perl/perl5@ba6e2c3 this fixes the issue regcomp*.c, regexec.c - fixup regex engine build under -Uusedl provided updates and synchronized libc.config base.config version.config to perl-5.38.0 removed deprecated arybase in perl-5.29.4 Signed-off-by: Andy Syam <privasisource@gmail.com>
* perl: update to 5.28.1Philip Prindeville2018-12-03
| | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* perl: update to 5.26.1Philip Prindeville2017-10-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Required changes: * Add qualifying '.' to scripts or to @INC, as appropriate since we're enabling default_inc_excludes_dot; * Add new platform/library definitions like double-double format and locale library functions/headers; * Delete patch 020 as it's been upstreamed; Optional changes: * Instead of using -@rm and having that fail, emit an error message, and be ignored, just use @rm -f instead which will always succeed. Security [CVE-2017-12837] Heap buffer overflow in regular expression compiler Compiling certain regular expression patterns with the case-insensitive modifier could cause a heap buffer overflow and crash perl. This has now been fixed. [perl #131582] [CVE-2017-12883] Buffer over-read in regular expression parser For certain types of syntax error in a regular expression pattern, the error message could either contain the contents of a random, possibly large, chunk of memory, or could crash perl. This has now been fixed. [perl #131598] [CVE-2017-12814] $ENV{$key} stack buffer overflow on Windows A possible stack buffer overflow in the %ENV code on Windows has been fixed by removing the buffer completely since it was superfluous anyway. [perl #131665] Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* lang/perl: Upgraded to Perl 5.24.1Michail Frolov2017-05-10
| | | | Signed-off-by: Michail Frolov <frolovm@pobox.com>
* perl: ensure File::Spec::canonpath() preserves taint [CVE-2015-8607]Jo-Philipp Wich2016-01-14
| | | | | | | | | | | | | | | | | Beginning in PathTools 3.47 and/or perl 5.20.0, the File::Spec::canonpath() routine returned untained strings even if passed tainted input. This defect undermines the guarantee of taint propagation, which is sometimes used to ensure that unvalidated user input does not reach sensitive code. This defect was found and reported by David Golden of MongoDB, and a patch was provided by Tony Cook. References: * https://rt.perl.org/Public/Bug/Display.html?id=126862 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607 Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
* perl: Reorganize patchesMarcel Denia2015-09-25
The old scheme didn't make any sense...not that there was a scheme really. Signed-off-by: Marcel Denia <naoir@gmx.net>