Your message dated Sun, 14 Aug 2016 09:49:49 +0000
with message-id <[email protected]>
and subject line Bug#832436: fixed in debhelper 9.20160814
has caused the Debian Bug report #832436,
regarding debhelper: pass -I. through to Makefile.PL and Build.PL
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
832436: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832436
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: debhelper
Version: 9.20160709
Severity: important
Hi maintainer,
An update for debhelper has been released as part of our handling for
the issue described below. This allows many packages to continue to
build once '.' is removed from @INC. The plan is to do that as soon as
practical in stable and unstable.
I attach the patch I applied for jessie; please could you review this
and apply something similar for sid?
Thanks,
Dominic.
----- Forwarded message from Salvatore Bonaccorso <[email protected]> -----
Date: Mon, 25 Jul 2016 14:18:38 +0000
From: Salvatore Bonaccorso <[email protected]>
To: [email protected]
Subject: [SECURITY] [DSA 3628-1] perl security update
-------------------------------------------------------------------------
Debian Security Advisory DSA-3628-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
July 25, 2016 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : perl
CVE ID : CVE-2016-1238 CVE-2016-6185
Debian Bug : 829578
Multiple vulnerabilities were discovered in the implementation of the
Perl programming language. The Common Vulnerabilities and Exposures
project identifies the following problems:
CVE-2016-1238
John Lightsey and Todd Rinaldo reported that the opportunistic
loading of optional modules can make many programs unintentionally
load code from the current working directory (which might be changed
to another directory without the user realising) and potentially
leading to privilege escalation, as demonstrated in Debian with
certain combinations of installed packages.
The problem relates to Perl loading modules from the includes
directory array ("@INC") in which the last element is the current
directory ("."). That means that, when "perl" wants to load a module
(during first compilation or during lazy loading of a module in run-
time), perl will look for the module in the current directory at the
end, since '.' is the last include directory in its array of include
directories to seek. The issue is with requiring libraries that are
in "." but are not otherwise installed.
With this update several modules which are known to be vulnerable
are updated to not load modules from current directory.
Additionally the update allows configurable removal of "." from @INC
in /etc/perl/sitecustomize.pl for a transitional period. It is
recommended to enable this setting if the possible breakage for a
specific site has been evaluated. Problems in packages provided in
Debian resulting from the switch to the removal of '.' from @INC
should be reported to the Perl maintainers at
[email protected] .
It is planned to switch to the default removal of '.' in @INC in a
subsequent update to perl via a point release if possible, and in
any case for the upcoming stable release Debian 9 (stretch).
CVE-2016-6185
It was discovered that XSLoader, a core module from Perl to
dynamically load C libraries into Perl code, could load shared
library from incorrect location. XSLoader uses caller() information
to locate the .so file to load. This can be incorrect if
XSLoader::load() is called in a string eval. An attacker can take
advantage of this flaw to execute arbitrary code.
For the stable distribution (jessie), these problems have been fixed in
version 5.20.2-3+deb8u6. Additionally this update includes the
following updated packages to address optional module loading
vulnerabilities related to CVE-2016-1238, or to address build failures
which occur when '.' is removed from @INC:
- cdbs 0.4.130+deb8u1
- debhelper 9.20150101+deb8u2
- devscripts 2.15.3+deb8u1
- exim4 4.84.2-2+deb8u1
- libintl-perl 1.23-1+deb8u1
- libmime-charset-perl 1.011.1-1+deb8u2
- libmime-encwords-perl 1.014.3-1+deb8u1
- libmodule-build-perl 0.421000-2+deb8u1
- libnet-dns-perl 0.81-2+deb8u1
- libsys-syslog-perl 0.33-1+deb8u1
- libunicode-linebreak-perl 0.0.20140601-2+deb8u2
We recommend that you upgrade your perl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
----- End forwarded message -----
>From d4ac7680af8f2d9c265bf96b9cb96942c7fe54a7 Mon Sep 17 00:00:00 2001
From: Dominic Hargreaves <[email protected]>
Date: Thu, 7 Jul 2016 16:54:15 +0200
Subject: [PATCH 1/2] Invoke Makefile.PL and Build.PL with perl -I. as part of
the fixes for CVE-2016-1238
---
Debian/Debhelper/Buildsystem/perl_build.pm | 2 +-
Debian/Debhelper/Buildsystem/perl_makemaker.pm | 2 +-
debian/changelog | 8 ++++++++
3 files changed, 10 insertions(+), 2 deletions(-)
diff --git a/Debian/Debhelper/Buildsystem/perl_build.pm b/Debian/Debhelper/Buildsystem/perl_build.pm
index 4cfbcb4..6b2ef8b 100644
--- a/Debian/Debhelper/Buildsystem/perl_build.pm
+++ b/Debian/Debhelper/Buildsystem/perl_build.pm
@@ -48,7 +48,7 @@ sub configure {
if ($ENV{LDFLAGS} && ! compat(8)) {
push @flags, "--config", "ld=$Config{ld} $ENV{CFLAGS} $ENV{LDFLAGS}";
}
- $this->do_perl("Build.PL", "--installdirs", "vendor", @flags, @_);
+ $this->do_perl("-I.", "Build.PL", "--installdirs", "vendor", @flags, @_);
}
sub build {
diff --git a/Debian/Debhelper/Buildsystem/perl_makemaker.pm b/Debian/Debhelper/Buildsystem/perl_makemaker.pm
index 60cda3d..c4f6b42 100644
--- a/Debian/Debhelper/Buildsystem/perl_makemaker.pm
+++ b/Debian/Debhelper/Buildsystem/perl_makemaker.pm
@@ -54,7 +54,7 @@ sub configure {
push @flags, "LD=$Config{ld} $ENV{CFLAGS} $ENV{LDFLAGS}";
}
- $this->doit_in_sourcedir("perl", "Makefile.PL", "INSTALLDIRS=vendor",
+ $this->doit_in_sourcedir("perl", "-I.", "Makefile.PL", "INSTALLDIRS=vendor",
# if perl_build is not tested first, need to pass packlist
# option to handle fallthrough case
(compat(7) ? "create_packlist=0" : ()),
diff --git a/debian/changelog b/debian/changelog
index a6408c7..d1455c4 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,11 @@
+debhelper (9.20150101+deb8u1) UNRELEASED; urgency=medium
+
+ * Non-maintainer upload.
+ * Invoke Makefile.PL and Build.PL with perl -I. as part of the fixes for
+ CVE-2016-1238
+
+ -- Dominic Hargreaves <[email protected]> Thu, 07 Jul 2016 16:53:02 +0200
+
debhelper (9.20150101) unstable; urgency=medium
[ Niels Thykier ]
--
2.1.4
--- End Message ---
--- Begin Message ---
Source: debhelper
Source-Version: 9.20160814
We believe that the bug you reported is fixed in the latest version of
debhelper, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Niels Thykier <[email protected]> (supplier of updated debhelper package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sun, 14 Aug 2016 09:19:35 +0000
Source: debhelper
Binary: debhelper
Architecture: source
Version: 9.20160814
Distribution: unstable
Urgency: medium
Maintainer: Debhelper Maintainers <[email protected]>
Changed-By: Niels Thykier <[email protected]>
Description:
debhelper - helper programs for debian/rules
Closes: 801732 815506 831465 832436
Changes:
debhelper (9.20160814) unstable; urgency=medium
.
* dh_installdocs: Apply patch from Sven Joachim to make
--link-doc work again in compat 11 (See: #830309)
* t: Apply patch from Sven Joachim to add some test cases
to dh_installdocs's --link-doc behaviour.
(Closes: #831465)
* dh_installinit,dh_systemd_start: Apply patches from
Peter Pentchev to make -R default in compat 10 (as
documented, but not as implemented).
* perl_{build,makemaker}.pm: Apply patch from Dominic
Hargreaves to explicitly pass -I. to perl. This is to
assist with the fix for CVE-2016-1238. (Closes: #832436)
* dh_install: Clarify that "debian/not-installed" is not
related to the --exclude parameter.
* dh_install: Apply patch from Sven Joachim to support
the "debian/tmp" prefix being optional in
"debian/not-installed". (Closes: #815506)
* Dh_Lib.pm: Apply patch from Dominic Hargreaves to set
PERL_USE_UNSAFE_INC to fix a further set of packages
which fail to build with . removed from @INC.
(Closes: #832436)
* Dh_Buildsystems.pm: Enable auto-detection of the maven
and gradle buildsystems (provided they are installed).
Thanks to Emmanuel Bourg for the suggestion.
(Closes: #801732)
Checksums-Sha1:
1bd3903f0368106d4dfcd360b0f1fc4c27f1da84 1666 debhelper_9.20160814.dsc
61d9d78c30d50c5f0b0f4cd25e845434f4fe536d 344328 debhelper_9.20160814.tar.xz
Checksums-Sha256:
90cc852f9c81d6ddaab26d4b1bf63d3a12e17be72158e806001a35c5984b7da9 1666
debhelper_9.20160814.dsc
2834a7c1dbeafd9402ea68948c815dab19d903503c45fd70e676269fccd359c0 344328
debhelper_9.20160814.tar.xz
Files:
34e0eb619484113f33b14e18b417ec57 1666 devel optional debhelper_9.20160814.dsc
2e6a77d0f969d2421260f3f75a2cf1ff 344328 devel optional
debhelper_9.20160814.tar.xz
-----BEGIN PGP SIGNATURE-----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=F03n
-----END PGP SIGNATURE-----
--- End Message ---