Headline
CVE-2016-1239: handle loading untrusted code from current directory (b43b5bbf) · Commits · Debian / The Debian Url ChecKer
duck before 0.10 did not properly handle loading of untrusted code from the current directory…
Commit b43b5bbf authored Jul 04, 2016 by
Browse files
handle loading untrusted code from current directory
- Changes 5
…
…
@@ -24,8 +24,6 @@
use strict;
use warnings;
use lib '.’;
package DUCK;
my $VERSION =’0.10’;
…
…
duck.conf /etc/duck
duck usr/bin
lib usr/share/duck
\ No newline at end of file
lib usr/share/duck
DUCK.pm /usr/share/duck
…
…
@@ -7,4 +7,4 @@ LIBDIR = lib
dh $@
override_dh_auto_test:
$(PERL) -Mlib=$(LIBDIR) -wc duck
\ No newline at end of file
$(PERL) -wc duck
\ No newline at end of file
…
…
@@ -24,8 +24,8 @@
use strict;
use lib '/usr/share/duck’;
use lib '/usr/share/duck/lib’;
use lib './lib’;
use DUCK;
use Getopt::Std;
…
…
@@ -37,7 +37,7 @@ use File::Path qw(remove_tree);
use Cwd;
use IPC::Open3;
use POSIX ":sys_wait_h";
require lib;
#require lib;
sub HELP_MESSAGE();
…
…
@@ -65,10 +65,10 @@ $SIG{INT} = sub { print $color_r."Aborting, please wait!\n".$color_n;$abort=1;cl
my $checksdir=’/usr/share/duck/lib/checks’;
if ( -d “./lib/checks” )
{
$checksdir=’./lib/checks’;
}
if ( -d “./lib/checks” )
#{
$checksdir=’./lib/checks’;
#}
my $try_https=0;
…
…
…
…
@@ -64,7 +64,8 @@ quiet mode. Suppress all output.
dry run. Don’t run any checks, just show entries to be checked.
.TP
\fB\–modules-dir=\fRDIRECTORY
specify modules directory. Mostly useful for developing new checks.
specify modules directory. Mostly useful for developing new checks. If this parameter is specified, only modules defined in this
directory are used. You have to copy all \fI*.pm\fR files from \fI/usr/share/duck/lib/checks\fR to the directory specified.
.TP
\fB\–color=\fR[WHEN]
Specify when to emit escape sequences to the output. Available options are:
…
…