USN-2607-1: Module::Signature vulnerabilities

Ubuntu Security Notice USN-2607-1

12th May, 2015

libmodule-signature-perl vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu (vivid)
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Module::Signature.

Software description

  • libmodule-signature-perl
    – module to manipulate CPAN SIGNATURE files

Details

John Lightsey discovered that Module::Signature incorrectly handled PGP
signature boundaries. A remote attacker could use this issue to trick
Module::Signature into parsing the unsigned portion of the SIGNATURE file
as the signed portion. (CVE-2015-3406)

John Lightsey discovered that Module::Signature incorrectly handled files
that were not listed in the SIGNATURE file. A remote attacker could use
this flaw to execute arbitrary code when tests were run. (CVE-2015-3407)

John Lightsey discovered that Module::Signature incorrectly handled
embedded shell commands in the SIGNATURE file. A remote attacker could use
this issue to execute arbitrary code during signature verification.
(CVE-2015-3408)

John Lightsey discovered that Module::Signature incorrectly handled module
loading. A remote attacker could use this issue to execute arbitrary code
during signature verification. (CVE-2015-3409)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu (vivid):
libmodule-signature-perl

0.73-1ubuntu0.15.04.1
Ubuntu 14.10:
libmodule-signature-perl

0.73-1ubuntu0.14.10.1
Ubuntu 14.04 LTS:
libmodule-signature-perl

0.73-1ubuntu0.14.04.1
Ubuntu 12.04 LTS:
libmodule-signature-perl

0.68-1ubuntu0.12.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-3406,

CVE-2015-3407,

CVE-2015-3408,

CVE-2015-3409

Leave a Reply