Bug 704994 (CVE-2011-0761)
Summary: | CVE-2011-0761 perl: NULL pointer dereference via crafted SOCKET, DIRHANDLE or FILEHANDLE value | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | cweyl, iarnell, jplesnik, kasal, lkundrak, mmaslano, perl-devel, perl-maint-list, ppisar, psabata, rc040203, tcallawa |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-07-25 12:02:32 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 705003 | ||
Bug Blocks: | 734553 |
Description
Jan Lieskovsky
2011-05-16 10:07:37 UTC
Public PoC from [3]: ==================== #!/usr/bin/perl $a = getsockname(9505,4590,"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAA",17792); This issue did NOT affect the versions of the perl package, as shipped with Red Hat Enterprise Linux 4 and 5. This issue affects the version of the perl package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the version of the perl package, as shipped with Fedora release of 13. This issue did NOT affect the version of the perl package, as shipped with Fedora release of 14. Created perl tracking bugs for this issue Affects: fedora-13 [bug 705003] Statement: Red Hat does not consider this problem to be a security issue. Input passed to these functions should be under the full control of the script author, therefore no trust boundary is crossed. Upstream mailing list reaction: http://www.xray.mpe.mpg.de/mailing-lists/perl5-porters/2011-06/msg00027.html regarding classification of this issue as a security flaw. |