USN-2607-1: Module::Signature vulnerabilities

12 May 2015

libmodule-signature-perl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Module::Signature.

Software Description

  • libmodule-signature-perl - module to manipulate CPAN SIGNATURE files

Details

John Lightsey discovered that Module::Signature incorrectly handled PGP signature boundaries. A remote attacker could use this issue to trick Module::Signature into parsing the unsigned portion of the SIGNATURE file as the signed portion. (CVE-2015-3406)

John Lightsey discovered that Module::Signature incorrectly handled files that were not listed in the SIGNATURE file. A remote attacker could use this flaw to execute arbitrary code when tests were run. (CVE-2015-3407)

John Lightsey discovered that Module::Signature incorrectly handled embedded shell commands in the SIGNATURE file. A remote attacker could use this issue to execute arbitrary code during signature verification. (CVE-2015-3408)

John Lightsey discovered that Module::Signature incorrectly handled module loading. A remote attacker could use this issue to execute arbitrary code during signature verification. (CVE-2015-3409)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.04
libmodule-signature-perl - 0.73-1ubuntu0.15.04.1
Ubuntu 14.10
libmodule-signature-perl - 0.73-1ubuntu0.14.10.1
Ubuntu 14.04 LTS
libmodule-signature-perl - 0.73-1ubuntu0.14.04.1
Ubuntu 12.04 LTS
libmodule-signature-perl - 0.68-1ubuntu0.12.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References