[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20130309145639.7FF1059945@kinkhorst.com>
Date: Sat, 9 Mar 2013 15:56:39 +0100 (CET)
From: Salvatore Bonaccorso <carnil@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 2641-1] perl security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2641-1 security@...ian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 09, 2013 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : perl
Vulnerability : rehashing flaw
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-1667
Debian Bug : 702296
Yves Orton discovered a flaw in the rehashing code of Perl. This flaw
could be exploited to carry out a denial of service attack against code
that uses arbitrary user input as hash keys. Specifically an attacker
could create a set of keys of a hash causing a denial of service via
memory exhaustion.
For the stable distribution (squeeze), this problem has been fixed in
version 5.10.1-17squeeze6.
For the testing distribution (wheezy), and the unstable distribution
(sid), this problem has been fixed in version 5.14.2-19.
We recommend that you upgrade your perl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJRO01lAAoJEFb2GnlAHawEoVAH/2g7orgxovXN2SRAwDsaw1pD
MYIx/E9rPl+BEjEqlYOKC4SImJoB2+pIv4p913jvZnknMU8e1U8TBqPEXdl7f9Ko
oXucxiv2LWSf67c1yV5BY7OIeIG9vsxfn1YuS0CmmxlyzBoxUSM+ZQ6SrHg9JRgc
1L5LOnAPF70u/dwlRIO8hy3kmXazvCcbNRc4FDPvk+pFXu1aiNwNGOC+LGou9JGA
ZdSs7YqFlR/gBGKxI4oESZMj5XT/JnTqePyJX8oLQa5D+WRnj5C9v1oBeinjUCpz
eUxz222nY/cOJOv6AoA/f3YBrf2k4Xh1IRfZZ8Dr1EhKgwkOk8V9PDuAmZ9ciC0=
=T27A
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists