USN-5230-1: App::cpanminus vulnerability

Publication date

24 January 2022

Overview

App::cpanminus could be made to bypass signature verification if it received specially crafted input.


Packages

  • cpanminus - script to get, unpack, build and install modules from CPAN

Details

It was discovered that App::cpanminus did not properly verify CHECKSUMS files.
An attacker could possibly use this issue to bypass signature verification,
gaining access to sensitive data or possibly executing unauthorized code.

It was discovered that App::cpanminus did not properly verify CHECKSUMS files.
An attacker could possibly use this issue to bypass signature verification,
gaining access to sensitive data or possibly executing unauthorized code.

Update instructions

After a standard system update, configure App::cpanminus to use only trusted CPAN mirrors over HTTPS using the option on the command line or environment variable.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 LTS focal cpanminus –  1.7044-1ubuntu0.1~esm1  
18.04 LTS bionic cpanminus –  1.7043-1ubuntu0.1~esm1  
16.04 LTS xenial cpanminus –  1.7040-1ubuntu0.1~esm1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›