[libmodule-signature-perl] 02/04: Add CVE-2015-3409.patch patch

Santiago Ruano Rincón santiago at moszumanska.debian.org
Tue Jun 30 10:33:26 UTC 2015


This is an automated email from the git hooks/post-receive script.

santiago pushed a commit to branch squeeze-lts
in repository libmodule-signature-perl.

commit ddc2764cdc1463cf5ad1ba372f34f781f31ffc66
Author: Salvatore Bonaccorso <carnil at debian.org>
Date:   Tue May 12 22:44:48 2015 +0200

    Add CVE-2015-3409.patch patch
    
    CVE-2015-3409: Module::Signature incorrectly handles module loading
    allowing to load modules from relative paths in @INC. A remote attacker
    providing a malicious module could use this issue to execute arbitrary
    code during signature verification.
    
    Closes: #783451
---
 debian/patches/CVE-2015-3409.patch | 24 ++++++++++++++++++++++++
 debian/patches/series              |  1 +
 2 files changed, 25 insertions(+)

diff --git a/debian/patches/CVE-2015-3409.patch b/debian/patches/CVE-2015-3409.patch
new file mode 100644
index 0000000..e0ccb7b
--- /dev/null
+++ b/debian/patches/CVE-2015-3409.patch
@@ -0,0 +1,24 @@
+Description: Fix CVE-2015-3409
+ CVE-2015-3409: Module::Signature incorrectly handles module loading
+ allowing to load modules from relative paths in @INC. A remote attacker
+ providing a malicious module could use this issue to execute arbitrary
+ code during signature verification.
+Origin: upstream, https://github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449bc9336f0bea658ef
+Bug-Debian: https://bugs.debian.org/783451
+Forwarded: not-needed
+Author: Audrey Tang <audreyt at audreyt.org>
+Reviewed-by: Salvatore Bonaccorso <carnil at debian.org>
+Last-Update: 2015-05-12
+Applied-Upstream: 0.75
+
+--- a/lib/Module/Signature.pm
++++ b/lib/Module/Signature.pm
+@@ -118,6 +118,8 @@ sub _verify {
+     my $sigtext   = shift || '';
+     my $plaintext = shift || '';
+ 
++    # Avoid loading modules from relative paths in @INC.
++    local @INC = grep { File::Spec->file_name_is_absolute($_) } @INC;
+     local $SIGNATURE = $signature if $signature ne $SIGNATURE;
+ 
+     if ($AutoKeyRetrieve and !$CanKeyRetrieve) {
diff --git a/debian/patches/series b/debian/patches/series
index 2b511c0..d2c2a5b 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,2 +1,3 @@
 CVE-2013-2145.patch
 CVE-2015-3406_CVE-2015-3407_CVE-2015-3408.patch
+CVE-2015-3409.patch

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-perl/packages/libmodule-signature-perl.git



More information about the Pkg-perl-cvs-commits mailing list