2015-10-16
ALT-BU-2015-2692-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2014-09-30
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2014-4330
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
Severity: LOW (2.1)
References:
- http://advisories.mageia.org/MGASA-2014-0406.html
- http://advisories.mageia.org/MGASA-2014-0406.html
- FEDORA-2014-11453
- FEDORA-2014-11453
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
- 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
- [oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
- [oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
- 61441
- 61441
- 61961
- 61961
- MDVSA-2015:136
- MDVSA-2015:136
- [perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
- [perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
- 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
- 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
- 70142
- 70142
- USN-2916-1
- USN-2916-1
- perl-cve20144330-dos(96216)
- perl-cve20144330-dos(96216)
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt
Package perl-XML-LibXML updated to version 2.0122-alt1 for branch sisyphus in task 151561.
Closed vulnerabilities
Published: 2015-05-12
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2015-3451
The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
Severity: MEDIUM (5.0)
References:
- http://advisories.mageia.org/MGASA-2015-0199.html
- http://advisories.mageia.org/MGASA-2015-0199.html
- http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes
- http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes
- FEDORA-2015-7115
- FEDORA-2015-7115
- FEDORA-2015-7258
- FEDORA-2015-7258
- openSUSE-SU-2015:1506
- openSUSE-SU-2015:1506
- DSA-3243
- DSA-3243
- MDVSA-2015:231
- MDVSA-2015:231
- [oss-security] 20150424 CVE request: Perl XML::LibXML
- [oss-security] 20150424 CVE request: Perl XML::LibXML
- [oss-security] 20150430 Re: CVE request: Perl XML::LibXML
- [oss-security] 20150430 Re: CVE request: Perl XML::LibXML
- 74333
- 74333
- USN-2592-1
- USN-2592-1
- https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/
- https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/