openSUSE-SU-2016:0163-1: moderate: Security update for perl-Module-Signature
openSUSE Security Update: Security update for perl-Module-Signature ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:0163-1 Rating: moderate References: #928382 Cross-References: CVE-2015-3406 CVE-2015-3407 CVE-2015-3408 CVE-2015-3409 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update to perl-Module-Signature 0.79 fixes the following security issues: * More protection of @INC from relative paths. (CVE-2015-3409) * Fix GPG signature parsing logic. (CVE-2015-3406) * MANIFEST.SKIP is no longer consulted unless --skip is given. (CVE-2015-3407) * Properly use open() modes to avoid injection attacks. (CVE-2015-3408) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-61=1 - openSUSE 13.1: zypper in -t patch openSUSE-2016-61=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (noarch): perl-Module-Signature-0.79-4.4.1 - openSUSE 13.1 (noarch): perl-Module-Signature-0.79-2.4.1 References: https://www.suse.com/security/cve/CVE-2015-3406.html https://www.suse.com/security/cve/CVE-2015-3407.html https://www.suse.com/security/cve/CVE-2015-3408.html https://www.suse.com/security/cve/CVE-2015-3409.html https://bugzilla.suse.com/928382
participants (1)
-
opensuse-security@opensuse.org