Bug 912276 - (CVE-2013-1667) CVE-2013-1667 perl: DoS in rehashing code
CVE-2013-1667 perl: DoS in rehashing code
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130304,repor...
: Security
Depends On: 915690 915691 915692 915693 918008
Blocks: 912291
  Show dependency treegraph
 
Reported: 2013-02-18 04:31 EST by Jan Lieskovsky
Modified: 2015-07-31 07:35 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-04-03 14:27:19 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Proposed upstream patch against perl-5.8.5 version (4.06 KB, patch)
2013-02-18 04:40 EST, Jan Lieskovsky
no flags Details | Diff
Proposed upstream patch against perl-5.8.8 version (4.32 KB, patch)
2013-02-18 04:41 EST, Jan Lieskovsky
no flags Details | Diff
Proposed upstream patch against perl-5.10.1 version (5.50 KB, patch)
2013-02-18 04:41 EST, Jan Lieskovsky
no flags Details | Diff
Proposed upstream patch against perl-5.12.5 version (5.41 KB, patch)
2013-02-18 04:42 EST, Jan Lieskovsky
no flags Details | Diff
Proposed upstream patch against perl-5.14.3 version (5.52 KB, patch)
2013-02-18 04:43 EST, Jan Lieskovsky
no flags Details | Diff
Proposed upstream patch against perl-5.16.2 version (5.46 KB, patch)
2013-02-18 04:43 EST, Jan Lieskovsky
no flags Details | Diff
Upstream 5.8.8 patch ported to RHEL-5 perl (4.36 KB, patch)
2013-03-04 11:34 EST, Petr Pisar
no flags Details | Diff

  None (edit)
Description Jan Lieskovsky 2013-02-18 04:31:30 EST
A denial of service flaw was found in the way Perl's rehashing code implementation (responsible for recalculation of hash keys and redistribution of hash content) used to react on certain user's input. If a Perl language based application accepted untrusted user input as hash keys, an attacker could use this flaw to cause the perl executable to consume excessive amount of memory (a denial of service via memory exhaustion).

References:
[1] http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html
Comment 3 Jan Lieskovsky 2013-02-18 04:40:35 EST
Created attachment 698789 [details]
Proposed upstream patch against perl-5.8.5 version
Comment 4 Jan Lieskovsky 2013-02-18 04:41:13 EST
Created attachment 698790 [details]
Proposed upstream patch against perl-5.8.8 version
Comment 5 Jan Lieskovsky 2013-02-18 04:41:45 EST
Created attachment 698791 [details]
Proposed upstream patch against perl-5.10.1 version
Comment 6 Jan Lieskovsky 2013-02-18 04:42:24 EST
Created attachment 698792 [details]
Proposed upstream patch against perl-5.12.5 version
Comment 7 Jan Lieskovsky 2013-02-18 04:43:05 EST
Created attachment 698793 [details]
Proposed upstream patch against perl-5.14.3 version
Comment 8 Jan Lieskovsky 2013-02-18 04:43:54 EST
Created attachment 698794 [details]
Proposed upstream patch against perl-5.16.2 version
Comment 9 Jan Lieskovsky 2013-02-18 05:08:59 EST
Acknowledgements:

Red Hat would like to thank Perl project for reporting this issue. Upstream acknowledges Yves Orton as the original issue reporter.
Comment 10 Jan Lieskovsky 2013-02-18 05:11:07 EST
This issue affects the versions of the perl package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the perl package, as shipped with Fedora release of 17 and 18.
Comment 14 Petr Pisar 2013-03-04 11:34:42 EST
Created attachment 705064 [details]
Upstream 5.8.8 patch ported to RHEL-5 perl
Comment 15 Vincent Danen 2013-03-04 18:05:13 EST
This is now corrected upstream:

Prevent premature hsplit() calls, and only trigger REHASH after hsplit():

http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5 (maint-5.16)
http://perl5.git.perl.org/perl.git/commitdiff/9d83adc (maint-5.12)
http://perl5.git.perl.org/perl.git/commitdiff/d59e31f (maint-5.14)
Comment 16 Jan Lieskovsky 2013-03-05 04:52:23 EST
Created perl tracking bugs for this issue

Affects: fedora-all [bug 918008]
Comment 17 Fedora Update System 2013-03-21 20:48:47 EDT
perl-5.16.2-240.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 20 errata-xmlrpc 2013-03-26 15:27:51 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:0685 https://rhn.redhat.com/errata/RHSA-2013-0685.html
Comment 21 Fedora Update System 2013-04-03 00:55:38 EDT
perl-5.14.4-224.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.