Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1139700 - (CVE-2014-4330) CVE-2014-4330 perl-Data-Dumper: deep recursion stack overflow
CVE-2014-4330 perl-Data-Dumper: deep recursion stack overflow
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20140918,reported=2...
: Security
Depends On: 1144903 1144904
Blocks: 1139705
  Show dependency treegraph
 
Reported: 2014-09-09 09:23 EDT by Vasyl Kaigorodov
Modified: 2018-09-12 18:51 EDT (History)
17 users (show)

See Also:
Fixed In Version: perl-Data-Dumper 2.154
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream provided patch (10.95 KB, patch)
2014-09-09 09:29 EDT, Vasyl Kaigorodov
no flags Details | Diff

  None (edit)
Description Vasyl Kaigorodov 2014-09-09 09:23:19 EDT
Upstream reports that they were given a report of stack memory exhaustion
through deep recursion in the Data::Dumper extension.

Original report below:

Issue Description
=================
During internal development a stack overflow was discovered. The cause of the
overflow lies in the Data::Dumper extension which is part of Perl-Core. By using
the "Dumper" method on a large Array-Reference which recursively contains other
Array-References, it is possible to cause many recursive calls to the DD_dump
native function and ultimately exhaust all available stack memory.

Impact
======
When the runtime stack grows over the maximal size, a guard page on most modern
operating systems is hit, causing the Perl interpreter to crash.
Depending on context, code execution might be possible if special circumstances
are met on some architectures.

Temporary Workaround and Fix
============================
Applications written in Perl should make sure that no unnecessary large
array references in terms of recursion are created. On the side of Perl
it should be investigated if the DD_dump function can be implemented
iteratively instead of recursively.
Comment 1 Vasyl Kaigorodov 2014-09-09 09:29:53 EDT
Created attachment 935700 [details]
Upstream provided patch

Attaching upstream patch
Comment 5 Tomas Hoger 2014-09-12 05:35:46 EDT
Upstream bug report (currently not public):

https://rt.perl.org/Public/Bug/Display.html?id=122111
Comment 6 Murray McAllister 2014-09-21 20:25:23 EDT
Acknowledgements:

Red Hat would like to thank the Ricardo Signes for reporting this issue. Upstream acknowledges Markus Vervier of LSE Leading Security Experts as the original reporter.
Comment 8 Murray McAllister 2014-09-21 20:32:21 EDT
Created perl-Data-Dumper tracking bugs for this issue:

Affects: fedora-all [bug 1144903]
Affects: epel-all [bug 1144904]
Comment 9 Jitka Plesnikova 2014-09-22 06:02:50 EDT
Could you please create tracking bugs also for RHEL 7 and RHSCL?
Comment 12 Fedora Update System 2014-09-29 00:06:00 EDT
perl-Data-Dumper-2.154-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 13 Fedora Update System 2014-10-08 15:17:20 EDT
perl-Data-Dumper-2.154-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 15 Vincent Danen 2014-10-15 16:11:33 EDT
Statement:

This issue affects the versions of perl as shipped with Red Hat Enterprise Linux 6 and the versions of perl-Data-Dumper as shipped with Red Hat Enterprise Linux 7. A future update may address this issue.

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Note You need to log in before you can comment on or make changes to this bug.