CVE-2013-1667
Published: 04 March 2013
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
Priority
Status
Package | Release | Status |
---|---|---|
perl Launchpad, Ubuntu, Debian |
Upstream |
Released
(5.14.2-19)
|
Patches: Vendor: http://www.debian.org/security/2013/dsa-2641 Upstream: http://perl5.git.perl.org/perl.git/commit/2674b61957c26a4924831d5110afa454ae7ae5a6 (5.8) Upstream: http://perl5.git.perl.org/perl.git/commit/f14269908e5f8b4cab4b55643d7dd9de577e7918 (5.10) Upstream: http://perl5.git.perl.org/perl.git/commit/9d83adcdf9ab3c1ac7d54d76f3944e57278f0e70 (5.12) Upstream: http://perl5.git.perl.org/perl.git/commit/d59e31fc729d8a39a774f03bc6bc457029a7aef2 (5.14) |