openSUSE Security Update : perl-Module-Signature (openSUSE-SU-2013:1178-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

perl-Module-Signature was updated to 0.73, fixing bugs and security
issues :

Security fix for code execution in signature checking :

- fix for bnc#828010 (CVE-2013-2145)

- Properly redo the previous fix using

- [Changes for 0.72 - Wed Jun 5 23:19:02 CST 2013]

- Only allow loading Digest::* from absolute paths in
@INC, by ensuring they begin with \ or / characters.
Contributed by: Florian Weimer (CVE-2013-2145)

- [Changes for 0.71 - Tue Jun 4 18:24:10 CST 2013]

- Constrain the user-specified digest name to /^\w+\d+$/.

- Avoid loading Digest::* from relative paths in @INC.
Contributed by: Florian Weimer (CVE-2013-2145)

- [Changes for 0.70 - Thu Nov 29 01:45:54 CST 2012]

- Don't check gpg version if gpg does not exist. This
avoids unnecessary warnings during installation when gpg
executable is not installed. Contributed by: Kenichi

- [Changes for 0.69 - Fri Nov 2 23:04:19 CST 2012]

- Support for gpg under these alternate names: gpg gpg2
gnupg gnupg2 Contributed by: Michael Schwern

See also :

Solution :

Update the affected perl-Module-Signature package.

Risk factor :

Medium / CVSS Base Score : 4.4

Family: SuSE Local Security Checks

Nessus Plugin ID: 75080 ()

Bugtraq ID:

CVE ID: CVE-2013-2145

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now