Bug 912276 (CVE-2013-1667)

Summary: CVE-2013-1667 perl: DoS in rehashing code
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: carnil, jrusnack, mjc, ppisar, psabata, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20130304,reported=20130215,source=upstream,cvss2=5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P,rhel-5/perl=affected,rhel-6/perl=affected,fedora-all/perl=affected
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-03 14:27:19 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Bug Depends On: 915690, 915691, 915692, 915693, 918008    
Bug Blocks: 912291    
Attachments:
Description Flags
Proposed upstream patch against perl-5.8.5 version
none
Proposed upstream patch against perl-5.8.8 version
none
Proposed upstream patch against perl-5.10.1 version
none
Proposed upstream patch against perl-5.12.5 version
none
Proposed upstream patch against perl-5.14.3 version
none
Proposed upstream patch against perl-5.16.2 version
none
Upstream 5.8.8 patch ported to RHEL-5 perl none

Description Jan Lieskovsky 2013-02-18 04:31:30 EST
A denial of service flaw was found in the way Perl's rehashing code implementation (responsible for recalculation of hash keys and redistribution of hash content) used to react on certain user's input. If a Perl language based application accepted untrusted user input as hash keys, an attacker could use this flaw to cause the perl executable to consume excessive amount of memory (a denial of service via memory exhaustion).

References:
[1] http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html
Comment 3 Jan Lieskovsky 2013-02-18 04:40:35 EST
Created attachment 698789 [details]
Proposed upstream patch against perl-5.8.5 version
Comment 4 Jan Lieskovsky 2013-02-18 04:41:13 EST
Created attachment 698790 [details]
Proposed upstream patch against perl-5.8.8 version
Comment 5 Jan Lieskovsky 2013-02-18 04:41:45 EST
Created attachment 698791 [details]
Proposed upstream patch against perl-5.10.1 version
Comment 6 Jan Lieskovsky 2013-02-18 04:42:24 EST
Created attachment 698792 [details]
Proposed upstream patch against perl-5.12.5 version
Comment 7 Jan Lieskovsky 2013-02-18 04:43:05 EST
Created attachment 698793 [details]
Proposed upstream patch against perl-5.14.3 version
Comment 8 Jan Lieskovsky 2013-02-18 04:43:54 EST
Created attachment 698794 [details]
Proposed upstream patch against perl-5.16.2 version
Comment 9 Jan Lieskovsky 2013-02-18 05:08:59 EST
Acknowledgements:

Red Hat would like to thank Perl project for reporting this issue. Upstream acknowledges Yves Orton as the original issue reporter.
Comment 10 Jan Lieskovsky 2013-02-18 05:11:07 EST
This issue affects the versions of the perl package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the perl package, as shipped with Fedora release of 17 and 18.
Comment 14 Petr Pisar 2013-03-04 11:34:42 EST
Created attachment 705064 [details]
Upstream 5.8.8 patch ported to RHEL-5 perl
Comment 15 Vincent Danen 2013-03-04 18:05:13 EST
This is now corrected upstream:

Prevent premature hsplit() calls, and only trigger REHASH after hsplit():

http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5 (maint-5.16)
http://perl5.git.perl.org/perl.git/commitdiff/9d83adc (maint-5.12)
http://perl5.git.perl.org/perl.git/commitdiff/d59e31f (maint-5.14)
Comment 16 Jan Lieskovsky 2013-03-05 04:52:23 EST
Created perl tracking bugs for this issue

Affects: fedora-all [bug 918008]
Comment 17 Fedora Update System 2013-03-21 20:48:47 EDT
perl-5.16.2-240.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 20 errata-xmlrpc 2013-03-26 15:27:51 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:0685 https://rhn.redhat.com/errata/RHSA-2013-0685.html
Comment 21 Fedora Update System 2013-04-03 00:55:38 EDT
perl-5.14.4-224.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.