Package: libmodule-signature-perl Version: 0.63-1 Severity: grave Tags: security patch upstream fixed-upstream Justification: user security hole
Hi, the following vulnerability was published for libmodule-signature-perl. CVE-2013-2145[0]: arbitrary code execution when verifying SIGNATURE Upstream patches are at [1] and further corrected at [2], and fixed upstream 0.72[3]. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2145 http://security-tracker.debian.org/tracker/CVE-2013-2145 [1] https://github.com/audreyt/module-signature/commit/575f7bd6ba4cc7c92f841e8758f88a131674ebf2 [2] https://github.com/audreyt/module-signature/commit/cbd06b392a73c63159dc5c20ff5b3c8fc88c4896 [3] https://metacpan.org/source/AUDREYT/Module-Signature-0.72/Changes Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team