USN-2607-1: Module::Signature vulnerabilities

Ubuntu Security Notice USN-2607-1

12th May, 2015

libmodule-signature-perl vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Module::Signature.

Software description

  • libmodule-signature-perl - module to manipulate CPAN SIGNATURE files

Details

John Lightsey discovered that Module::Signature incorrectly handled PGP
signature boundaries. A remote attacker could use this issue to trick
Module::Signature into parsing the unsigned portion of the SIGNATURE file
as the signed portion. (CVE-2015-3406)

John Lightsey discovered that Module::Signature incorrectly handled files
that were not listed in the SIGNATURE file. A remote attacker could use
this flaw to execute arbitrary code when tests were run. (CVE-2015-3407)

John Lightsey discovered that Module::Signature incorrectly handled
embedded shell commands in the SIGNATURE file. A remote attacker could use
this issue to execute arbitrary code during signature verification.
(CVE-2015-3408)

John Lightsey discovered that Module::Signature incorrectly handled module
loading. A remote attacker could use this issue to execute arbitrary code
during signature verification. (CVE-2015-3409)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 15.04:
libmodule-signature-perl 0.73-1ubuntu0.15.04.1
Ubuntu 14.10:
libmodule-signature-perl 0.73-1ubuntu0.14.10.1
Ubuntu 14.04 LTS:
libmodule-signature-perl 0.73-1ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libmodule-signature-perl 0.68-1ubuntu0.12.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-3406, CVE-2015-3407, CVE-2015-3408, CVE-2015-3409