File: CVE-2013-1437-documentation-fix.patch

package info (click to toggle)
libmodule-metadata-perl 1.000009-1%2Bdeb7u1
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 212 kB
  • sloc: perl: 1,644; makefile: 2
file content (28 lines) | stat: -rw-r--r-- 1,182 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Description: Fix serious documentation bug aboute statement of execution of unsafe code
 Addresses CVE-2013-1437 as (serious) documentation bug:
 Module::Metadata executes code when gathering metadata about a module
 by design. In versions previous to (upstream) 1.000015 the
 documentation stated, however, that Module::Metadata provides a
 standard way to gather metadata about a .pm file without executing
 unsafe code.
Origin: upstream, http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=p5sagit/Module-Metadata.git;a=commitdiff;h=c0278e58ecbced5d852526c1c5d088c8df6ba618
Forwarded: not-needed
Author: Salvatore Bonaccorso <carnil@debian.org>
Last-Update: 2013-09-03
Applied-Upstream: 1.000015

--- a/lib/Module/Metadata.pm
+++ b/lib/Module/Metadata.pm
@@ -719,8 +719,10 @@
 
 =head1 DESCRIPTION
 
-This module provides a standard way to gather metadata about a .pm file
-without executing unsafe code.
+This module provides a standard way to gather metadata about a .pm file through
+(mostly) static analysis and (some) code execution.  When determining the
+version of a module, the C<$VERSION> assignment is C<eval>ed, as is traditional
+in the CPAN toolchain.
 
 =head1 USAGE