Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2016-1239: handle loading untrusted code from current directory (b43b5bbf) · Commits · Debian / The Debian Url ChecKer

duck before 0.10 did not properly handle loading of untrusted code from the current directory…

CVE
#debian

Commit b43b5bbf authored Jul 04, 2016 by Simon Kainz's avatar

Browse files

handle loading untrusted code from current directory

  • Changes 5

@@ -24,8 +24,6 @@

use strict;

use warnings;

use lib '.’;

package DUCK;

my $VERSION =’0.10’;

duck.conf /etc/duck

duck usr/bin

lib usr/share/duck

\ No newline at end of file

lib usr/share/duck

DUCK.pm /usr/share/duck

@@ -7,4 +7,4 @@ LIBDIR = lib

dh $@

override_dh_auto_test:

$(PERL) -Mlib=$(LIBDIR) -wc duck

\ No newline at end of file

$(PERL) -wc duck

\ No newline at end of file

@@ -24,8 +24,8 @@

use strict;

use lib '/usr/share/duck’;

use lib '/usr/share/duck/lib’;

use lib './lib’;

use DUCK;

use Getopt::Std;

@@ -37,7 +37,7 @@ use File::Path qw(remove_tree);

use Cwd;

use IPC::Open3;

use POSIX ":sys_wait_h";

require lib;

#require lib;

sub HELP_MESSAGE();

@@ -65,10 +65,10 @@ $SIG{INT} = sub { print $color_r."Aborting, please wait!\n".$color_n;$abort=1;cl

my $checksdir=’/usr/share/duck/lib/checks’;

if ( -d “./lib/checks” )

{

$checksdir=’./lib/checks’;

}

if ( -d “./lib/checks” )

#{

$checksdir=’./lib/checks’;

#}

my $try_https=0;

@@ -64,7 +64,8 @@ quiet mode. Suppress all output.

dry run. Don’t run any checks, just show entries to be checked.

.TP

\fB\–modules-dir=\fRDIRECTORY

specify modules directory. Mostly useful for developing new checks.

specify modules directory. Mostly useful for developing new checks. If this parameter is specified, only modules defined in this

directory are used. You have to copy all \fI*.pm\fR files from \fI/usr/share/duck/lib/checks\fR to the directory specified.

.TP

\fB\–color=\fR[WHEN]

Specify when to emit escape sequences to the output. Available options are:

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907