[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2641-2 libapache2-mod-perl2 -- rehashing flaw

ID: oval:org.secpod.oval:def:600997Date: (C)2013-03-22   (M)2023-12-07
Class: PATCHFamily: unix




The security fix applied to the perl package due to CVE-2013-1667 introduced a test failure in libapache2-mod-perl2 source package specific to the rehash mechanism in Perl. See Debian Bug #702821 for details. This update fixes that problem. For reference, the original advisory text for perl follows. Yves Orton discovered a flaw in the rehashing code of Perl. This flaw could be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys. Specifically an attacker could create a set of keys of a hash causing a denial of service via memory exhaustion.

Platform:
Debian 6.0
Product:
libapache2-mod-perl2
Reference:
DSA-2641-2
CVE-2013-1667
CVE    1
CVE-2013-1667
CPE    2
cpe:/o:debian:debian_linux:6.0
cpe:/a:apache:libapache2-mod-perl2

© SecPod Technologies