Man1 - perl5222delta.1perl

Table of Contents



NAME

perl5222delta - what is new for perl v5.22.2

DESCRIPTION

This document describes differences between the 5.22.1 release and the 5.22.2 release.

If you are upgrading from an earlier release such as 5.22.0, first read perl5221delta, which describes differences between 5.22.0 and 5.22.1.

Security

Fix out of boundary access in Win32 path handling

This is CVE-2015-8608. For more information see [GH #15067] https://github.com/Perl/perl5/issues/15067.

Fix loss of taint in “canonpath()”

This is CVE-2015-8607. For more information see [GH #15084] https://github.com/Perl/perl5/issues/15084.

Set proper umask before calling mkstemp(3)

In 5.22.0 perl started setting umask to 0600 before calling mkstemp(3) and restoring it afterwards. This wrongfully tells open(2) to strip the owner read and write bits from the given mode before applying it, rather than the intended negation of leaving only those bits in place.

Systems that use mode 0666 in mkstemp(3) (like old versions of glibc) create a file with permissions 0066, leaving world read and write permissions regardless of current umask.

This has been fixed by using umask 0177 instead.

[GH #15135] https://github.com/Perl/perl5/issues/15135

Avoid accessing uninitialized memory in Win32 “crypt()”

Validation that will detect both a short salt and invalid characters in the salt has been added.

[GH #15091] https://github.com/Perl/perl5/issues/15091

Remove duplicate environment variables from “environ”

Previously, if an environment variable appeared more than once in environ[], %ENV would contain the last entry for that name, while a typical getenv() would return the first entry. We now make sure %ENV contains the same as what getenv() returns.

Secondly, we now remove duplicates from environ[], so if a setting with that name is set in %ENV we won’t pass an unsafe value to a child process.

This is CVE-2016-2381.

Incompatible Changes

There are no changes intentionally incompatible with Perl 5.22.1. If any exist, they are bugs, and we request that you submit a report. See Reporting Bugs below.

Modules and Pragmata

Updated Modules and Pragmata

  • :Spec has been upgraded from version 3.56 to 3.56_01. canonpath() now preserves taint. See “Fix loss of taint in canonpath()”.
  • Module::CoreList has been upgraded from version 5.20151213 to 5.20160429. The version number of Digest::SHA listed for Perl 5.18.4 was wrong and has been corrected. Likewise for the version number of Config in 5.18.3 and 5.18.4. [GH #15202] https://github.com/Perl/perl5/issues/15202

Documentation

Changes to Existing Documentation

perldiag

  • The explanation of the warning unable to close filehandle %s properly: %s which can occur when doing an implicit close of a filehandle has been expanded and improved.

perlfunc

  • The documentation of hex() has been revised to clarify valid inputs.

Configuration and Compilation

  • Dtrace builds now build successfully on systems with a newer dtrace that require an input object file that uses the probes in the .d file. Previously the probe would fail and cause a build failure. [GH #13985] https://github.com/Perl/perl5/issues/13985
  • Configure no longer probes for libnm by default. Originally this was the New Math library, but the name has been re-used by the GNOME NetworkManager. [GH #15115] https://github.com/Perl/perl5/issues/15115
  • Configure now knows about gcc 5.
  • Compiling perl with -DPERL_MEM_LOG now works again.

Platform Support

Platform-Specific Notes

Darwin
Compiling perl with -Dusecbacktrace on Darwin now works again. [GH #15245] https://github.com/Perl/perl5/issues/15245
OS X/Darwin
Builds with both -DDEBUGGING and threading enabled would fail with a panic: free from wrong pool error when built or tested from Terminal on OS X. This was caused by perl’s internal management of the environment conflicting with an atfork handler using the libc setenv() function to update the environment. Perl now uses setenv()=/=unsetenv() to update the environment on OS X. [GH #14955] https://github.com/Perl/perl5/issues/14955
ppc64el
The floating point format of ppc64el (Debian naming for little-endian PowerPC) is now detected correctly.
Tru64
A test failure in t/porting/extrefs.t has been fixed.

Internal Changes

  • An unwarranted assertion in Perl_newATTRSUB_x() has been removed. If a stub subroutine definition with a prototype has been seen, then any subsequent stub (or definition) of the same subroutine with an attribute was causing an assertion failure because of a null pointer. [GH #15081] https://github.com/Perl/perl5/issues/15081

Selected Bug Fixes

Acknowledgements

Perl 5.22.2 represents approximately 5 months of development since Perl 5.22.1 and contains approximately 3,000 lines of changes across 110 files from 24 authors.

Excluding auto-generated files, documentation and release tools, there were approximately 1,500 lines of changes to 52 .pm, .t, .c and .h files.

Perl continues to flourish into its third decade thanks to a vibrant community of users and developers. The following people are known to have contributed the improvements that became Perl 5.22.2:

Aaron Crane, Abigail, Andreas Ko\k:.nig, Aristotle Pagaltzis, Chris ’BinGOs’ Williams, Craig A. Berry, Dagfinn Ilmari Mannsa\k:°’u-0)/2u’(deker, David Golden, David Mitchell, H.Merijn Brand, James E Keenan, Jarkko Hietaniemi, Karen Etheridge, Karl Williamson, Matthew Horsfall, Niko Tyni, Ricardo Signes, Sawyer X, Stevan Little, Steve Hay, Todd Rinaldo, Tony Cook, Vladimir Timofeev, Yves Orton.

The list above is almost certainly incomplete as it is automatically generated from version control history. In particular, it does not include the names of the (very much appreciated) contributors who reported issues to the Perl bug tracker.

Many of the changes included in this version originated in the CPAN modules included in Perl’s core. We’re grateful to the entire CPAN community for helping Perl to flourish.

For a more complete list of all of Perl’s historical contributors, please see the AUTHORS file in the Perl source distribution.

Reporting Bugs

If you find what you think is a bug, you might check the articles recently posted to the comp.lang.perl.misc newsgroup and the perl bug database at https://rt.perl.org/ . There may also be information at http://www.perl.org/ , the Perl Home Page.

If you believe you have an unreported bug, please run the perlbug program included with your release. Be sure to trim your bug down to a tiny but sufficient test case. Your bug report, along with the output of perl -V, will be sent off to perlbug@perl.org to be analysed by the Perl porting team.

If the bug you are reporting has security implications, which make it inappropriate to send to a publicly archived mailing list, then please send it to perl5-security-report@perl.org. This points to a closed subscription unarchived mailing list, which includes all the core committers, who will be able to help assess the impact of issues, figure out a resolution, and help co-ordinate the release of patches to mitigate or fix the problem across all platforms on which Perl is supported. Please only use this address for security issues in the Perl core, not for modules independently distributed on CPAN.

SEE ALSO

The Changes file for an explanation of how to view exhaustive details on what changed.

The INSTALL file for how to build Perl.

The README file for general stuff.

The Artistic and Copying files for copyright information.

Author: dt

Created: 2022-02-22 Tue 16:49