You are here
Home > Preporuke > Sigurnosni nedostaci perl modula Module-Signature i Test-Signature

Sigurnosni nedostaci perl modula Module-Signature i Test-Signature

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5840
2015-04-09 04:58:27
——————————————————————————–

Name : perl-Module-Signature
Product : Fedora 20
Version : 0.78
Release : 1.fc20
URL : http://search.cpan.org/dist/Module-Signature/
Summary : CPAN signature management utilities and modules
Description :
This package contains a command line tool and module for checking and creating
SIGNATURE files for Perl CPAN distributions.

——————————————————————————–
Update Information:

This update addresses various security issues in perl-Module-Signature as described below. The default behavior is also changed so as to ignore any MANIFEST.SKIP files unless a “skip” parameter is specified. An updated version of perl-Test-Signature that accounts for the changed default behavior is included in this update.

Security issues:

* Module::Signature before version 0.75 could be tricked into interpreting the unsigned portion of a SIGNATURE file as the signed portion due to faulty parsing of the PGP signature boundaries.

* When verifying the contents of a CPAN module, Module::Signature before version 0.75 ignored some files in the extracted tarball that were not listed in the signature file. This included some files in the t/ directory that would execute
automatically during “make test”.

* Module::Signature before version 0.75 used two argument open() calls to read the files when generating checksums from the signed manifest. This allowed embedding arbitrary shell commands into the SIGNATURE file that would execute during the signature verification process.

* Module::Signature before version 0.75 has been loading several modules at runtime inside the extracted module directory. Modules like Text::Diff are not guaranteed to be available on all platforms and could be added to a malicious
module so that they would load from the ‘.’ path in @INC.

——————————————————————————–
ChangeLog:

* Thu Apr 9 2015 Paul Howarth <paul@city-fan.org> – 0.78-1
– Update to 0.78
– Fix verify() use from cpanm and CPAN.pm
* Wed Apr 8 2015 Paul Howarth <paul@city-fan.org> – 0.77-1
– Update to 0.77
– Include the latest public keys of PAUSE, ANDK and AUDREYT
– Clarify scripts/cpansign copyright to CC0 (#965126, CPAN RT#85466)
* Wed Apr 8 2015 Paul Howarth <paul@city-fan.org> – 0.76-1
– Update to 0.76
– Fix signature tests by defaulting to verify(skip=>1) when
$ENV{TEST_SIGNATURE} is true
* Tue Apr 7 2015 Paul Howarth <paul@city-fan.org> – 0.75-1
– Update to 0.75
– Fix GPG signature parsing logic
– MANIFEST.SKIP is no longer consulted unless –skip is given
– Properly use open() modes to avoid injection attacks
– More protection of @INC from relative paths
– Don’t try to run the signature test, which needs the network
* Wed Aug 27 2014 Jitka Plesnikova <jplesnik@redhat.com> – 0.73-5
– Perl 5.20 rebuild
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 0.73-4
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1209911 – perl-Module-Signature: unsigned files interpreted as signed in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209911
[ 2 ] Bug #1209915 – perl-Module-Signature: arbitrary code execution during test phase
https://bugzilla.redhat.com/show_bug.cgi?id=1209915
[ 3 ] Bug #1209917 – perl-Module-Signature: arbitrary code execution when verifying module signatures
https://bugzilla.redhat.com/show_bug.cgi?id=1209917
[ 4 ] Bug #1209918 – perl-Module-Signature: arbitrary modules loading in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209918
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update perl-Module-Signature’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5840
2015-04-09 04:58:27
——————————————————————————–

Name : perl-Test-Signature
Product : Fedora 20
Version : 1.11
Release : 1.fc20
URL : http://search.cpan.org/dist/Test-Signature/
Summary : Automated SIGNATURE testing
Description :
Module::Signature allows you to verify that a distribution has not been
tampered with. Test::Signature lets that be tested as part of the
distribution’s test suite.

——————————————————————————–
Update Information:

This update addresses various security issues in perl-Module-Signature as described below. The default behavior is also changed so as to ignore any MANIFEST.SKIP files unless a “skip” parameter is specified. An updated version of perl-Test-Signature that accounts for the changed default behavior is included in this update.

Security issues:

* Module::Signature before version 0.75 could be tricked into interpreting the unsigned portion of a SIGNATURE file as the signed portion due to faulty parsing of the PGP signature boundaries.

* When verifying the contents of a CPAN module, Module::Signature before version 0.75 ignored some files in the extracted tarball that were not listed in the signature file. This included some files in the t/ directory that would execute
automatically during “make test”.

* Module::Signature before version 0.75 used two argument open() calls to read the files when generating checksums from the signed manifest. This allowed embedding arbitrary shell commands into the SIGNATURE file that would execute during the signature verification process.

* Module::Signature before version 0.75 has been loading several modules at runtime inside the extracted module directory. Modules like Text::Diff are not guaranteed to be available on all platforms and could be added to a malicious
module so that they would load from the ‘.’ path in @INC.

——————————————————————————–
ChangeLog:

* Wed Apr 8 2015 Paul Howarth <paul@city-fan.org> – 1.11-1
– Update to 1.11
– Compatibility with Module::Signature 0.75+
– Classify buildreqs by usage
– Don’t use macros for commands
– Avoid clobbering ~/.gnupg for local builds
– Make %files list more explicit
– Drop %defattr, redundant since rpm 4.4
– Import upstream’s GPG key in %prep so we don’t need to fetch it from a
keyserver when running the signature test
* Tue Aug 26 2014 Jitka Plesnikova <jplesnik@redhat.com> – 1.10-18
– Perl 5.20 rebuild
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 1.10-17
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
——————————————————————————–
References:

[ 1 ] Bug #1209911 – perl-Module-Signature: unsigned files interpreted as signed in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209911
[ 2 ] Bug #1209915 – perl-Module-Signature: arbitrary code execution during test phase
https://bugzilla.redhat.com/show_bug.cgi?id=1209915
[ 3 ] Bug #1209917 – perl-Module-Signature: arbitrary code execution when verifying module signatures
https://bugzilla.redhat.com/show_bug.cgi?id=1209917
[ 4 ] Bug #1209918 – perl-Module-Signature: arbitrary modules loading in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209918
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update perl-Test-Signature’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5833
2015-04-09 04:58:00
——————————————————————————–

Name : perl-Module-Signature
Product : Fedora 21
Version : 0.78
Release : 1.fc21
URL : http://search.cpan.org/dist/Module-Signature/
Summary : CPAN signature management utilities and modules
Description :
This package contains a command line tool and module for checking and creating
SIGNATURE files for Perl CPAN distributions.

——————————————————————————–
Update Information:

This update addresses various security issues in perl-Module-Signature as described below. The default behavior is also changed so as to ignore any MANIFEST.SKIP files unless a “skip” parameter is specified. An updated version of perl-Test-Signature that accounts for the changed default behavior is included in this update.

Security issues:

* Module::Signature before version 0.75 could be tricked into interpreting the unsigned portion of a SIGNATURE file as the signed portion due to faulty parsing of the PGP signature boundaries.

* When verifying the contents of a CPAN module, Module::Signature before version 0.75 ignored some files in the extracted tarball that were not listed in the signature file. This included some files in the t/ directory that would execute
automatically during “make test”.

* Module::Signature before version 0.75 used two argument open() calls to read the files when generating checksums from the signed manifest. This allowed embedding arbitrary shell commands into the SIGNATURE file that would execute during the signature verification process.

* Module::Signature before version 0.75 has been loading several modules at runtime inside the extracted module directory. Modules like Text::Diff are not guaranteed to be available on all platforms and could be added to a malicious
module so that they would load from the ‘.’ path in @INC.

——————————————————————————–
ChangeLog:

* Thu Apr 9 2015 Paul Howarth <paul@city-fan.org> – 0.78-1
– Update to 0.78
– Fix verify() use from cpanm and CPAN.pm
* Wed Apr 8 2015 Paul Howarth <paul@city-fan.org> – 0.77-1
– Update to 0.77
– Include the latest public keys of PAUSE, ANDK and AUDREYT
– Clarify scripts/cpansign copyright to CC0 (#965126, CPAN RT#85466)
* Wed Apr 8 2015 Paul Howarth <paul@city-fan.org> – 0.76-1
– Update to 0.76
– Fix signature tests by defaulting to verify(skip=>1) when
$ENV{TEST_SIGNATURE} is true
* Tue Apr 7 2015 Paul Howarth <paul@city-fan.org> – 0.75-1
– Update to 0.75
– Fix GPG signature parsing logic
– MANIFEST.SKIP is no longer consulted unless –skip is given
– Properly use open() modes to avoid injection attacks
– More protection of @INC from relative paths
– Don’t try to run the signature test, which needs the network
* Wed Aug 27 2014 Jitka Plesnikova <jplesnik@redhat.com> – 0.73-5
– Perl 5.20 rebuild
——————————————————————————–
References:

[ 1 ] Bug #1209911 – perl-Module-Signature: unsigned files interpreted as signed in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209911
[ 2 ] Bug #1209915 – perl-Module-Signature: arbitrary code execution during test phase
https://bugzilla.redhat.com/show_bug.cgi?id=1209915
[ 3 ] Bug #1209917 – perl-Module-Signature: arbitrary code execution when verifying module signatures
https://bugzilla.redhat.com/show_bug.cgi?id=1209917
[ 4 ] Bug #1209918 – perl-Module-Signature: arbitrary modules loading in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209918
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update perl-Module-Signature’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-5833
2015-04-09 04:58:00
——————————————————————————–

Name : perl-Test-Signature
Product : Fedora 21
Version : 1.11
Release : 1.fc21
URL : http://search.cpan.org/dist/Test-Signature/
Summary : Automated SIGNATURE testing
Description :
Module::Signature allows you to verify that a distribution has not been
tampered with. Test::Signature lets that be tested as part of the
distribution’s test suite.

——————————————————————————–
Update Information:

This update addresses various security issues in perl-Module-Signature as described below. The default behavior is also changed so as to ignore any MANIFEST.SKIP files unless a “skip” parameter is specified. An updated version of perl-Test-Signature that accounts for the changed default behavior is included in this update.

Security issues:

* Module::Signature before version 0.75 could be tricked into interpreting the unsigned portion of a SIGNATURE file as the signed portion due to faulty parsing of the PGP signature boundaries.

* When verifying the contents of a CPAN module, Module::Signature before version 0.75 ignored some files in the extracted tarball that were not listed in the signature file. This included some files in the t/ directory that would execute
automatically during “make test”.

* Module::Signature before version 0.75 used two argument open() calls to read the files when generating checksums from the signed manifest. This allowed embedding arbitrary shell commands into the SIGNATURE file that would execute during the signature verification process.

* Module::Signature before version 0.75 has been loading several modules at runtime inside the extracted module directory. Modules like Text::Diff are not guaranteed to be available on all platforms and could be added to a malicious
module so that they would load from the ‘.’ path in @INC.

——————————————————————————–
ChangeLog:

* Wed Apr 8 2015 Paul Howarth <paul@city-fan.org> – 1.11-1
– Update to 1.11
– Compatibility with Module::Signature 0.75+
– Classify buildreqs by usage
– Don’t use macros for commands
– Avoid clobbering ~/.gnupg for local builds
– Make %files list more explicit
– Drop %defattr, redundant since rpm 4.4
– Import upstream’s GPG key in %prep so we don’t need to fetch it from a
keyserver when running the signature test
* Tue Aug 26 2014 Jitka Plesnikova <jplesnik@redhat.com> – 1.10-18
– Perl 5.20 rebuild
——————————————————————————–
References:

[ 1 ] Bug #1209911 – perl-Module-Signature: unsigned files interpreted as signed in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209911
[ 2 ] Bug #1209915 – perl-Module-Signature: arbitrary code execution during test phase
https://bugzilla.redhat.com/show_bug.cgi?id=1209915
[ 3 ] Bug #1209917 – perl-Module-Signature: arbitrary code execution when verifying module signatures
https://bugzilla.redhat.com/show_bug.cgi?id=1209917
[ 4 ] Bug #1209918 – perl-Module-Signature: arbitrary modules loading in some circumstances
https://bugzilla.redhat.com/show_bug.cgi?id=1209918
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update perl-Test-Signature’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2015-04-0004-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivosti programskog paketa php-symfony

Otkrivene su dvije ranjivosti u programskom paketu php-symfony za Fedoru. Prva ranjivost uzrokovana je nepravilnom obradom taga "", što je...

Close