perl-Module-Signature: security update

perl-Module-Signature was updated to 0.73, fixing bugs and security issues:

Security fix for code execution in signature checking:
* fix for bnc#828010 (CVE-2013-2145)
* Properly redo the previous fix using File::Spec->file_name_is_absolute.

- [Changes for 0.72 - Wed Jun 5 23:19:02 CST 2013]
* Only allow loading Digest::* from absolute paths in @INC,
by ensuring they begin with \ or / characters.
Contributed by: Florian Weimer (CVE-2013-2145)
- [Changes for 0.71 - Tue Jun 4 18:24:10 CST 2013]
* Constrain the user-specified digest name to /^\w+\d+$/.
* Avoid loading Digest::* from relative paths in @INC.
Contributed by: Florian Weimer (CVE-2013-2145)
- [Changes for 0.70 - Thu Nov 29 01:45:54 CST 2012]
* Don't check gpg version if gpg does not exist.
This avoids unnecessary warnings during installation
when gpg executable is not installed.
Contributed by: Kenichi Ishigaki
- [Changes for 0.69 - Fri Nov 2 23:04:19 CST 2012]
* Support for gpg under these alternate names:
gpg gpg2 gnupg gnupg2
Contributed by: Michael Schwern
- [Changes for 0.68 - Wed Dec 14 12:14:47 UTC 2011]
* Fix breakage introduced by 0.67 (Andreas König).
* Better handling of \r (Andreas König, Zefram)

Fixed bugs
bnc#828010
VUL-0: CVE-2013-2145: perl-Module-Signature: arbitrary code execution when verifying SIGNATURE
Selected Binaries
openSUSE Build Service is sponsored by