2015-10-16
ALT-BU-2015-2692-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2014-09-30
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2014-4330
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
Severity: LOW (2.1)
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
References:
- http://advisories.mageia.org/MGASA-2014-0406.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- http://seclists.org/fulldisclosure/2014/Sep/84
- http://seclists.org/oss-sec/2014/q3/692
- http://secunia.com/advisories/61441
- http://secunia.com/advisories/61961
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
- http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
- http://www.securityfocus.com/archive/1/533543/100/0/threaded
- http://www.securityfocus.com/bid/70142
- http://www.ubuntu.com/usn/USN-2916-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt
- http://advisories.mageia.org/MGASA-2014-0406.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- http://seclists.org/fulldisclosure/2014/Sep/84
- http://seclists.org/oss-sec/2014/q3/692
- http://secunia.com/advisories/61441
- http://secunia.com/advisories/61961
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
- http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
- http://www.securityfocus.com/archive/1/533543/100/0/threaded
- http://www.securityfocus.com/bid/70142
- http://www.ubuntu.com/usn/USN-2916-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt
Package perl-XML-LibXML updated to version 2.0122-alt1 for branch sisyphus in task 151561.
Closed vulnerabilities
Published: 2015-05-12
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-3451
The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
References:
- http://advisories.mageia.org/MGASA-2015-0199.html
- http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157448.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157740.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html
- http://www.debian.org/security/2015/dsa-3243
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:231
- http://www.openwall.com/lists/oss-security/2015/04/25/2
- http://www.openwall.com/lists/oss-security/2015/04/30/1
- http://www.securityfocus.com/bid/74333
- http://www.ubuntu.com/usn/USN-2592-1
- https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/
- http://advisories.mageia.org/MGASA-2015-0199.html
- http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157448.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157740.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html
- http://www.debian.org/security/2015/dsa-3243
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:231
- http://www.openwall.com/lists/oss-security/2015/04/25/2
- http://www.openwall.com/lists/oss-security/2015/04/30/1
- http://www.securityfocus.com/bid/74333
- http://www.ubuntu.com/usn/USN-2592-1
- https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/