|
Message-ID: <20130115093221.GA5967@elende> Date: Tue, 15 Jan 2013 10:32:21 +0100 From: Salvatore Bonaccorso <carnil@...ian.org> To: oss-security@...ts.openwall.com Cc: team@...urity.debian.org Subject: CVE request: Digest::SHA double free when using load subroutine Hi The following was fixed in Digest-SHA Perl module in Version 5.81: 5.81 Mon Jan 14 05:17:08 MST 2013 - corrected load subroutine (SHA.pm) to prevent double-free -- Bug #82655: Security issue - segfault -- thanks to Victor Efimov and Nicholas Clark for technical expertise and suggestions Upstream bugreport is: https://rt.cpan.org/Public/Bug/Display.html?id=82655 Diff: https://metacpan.org/diff/release/MSHELOR/Digest-SHA-5.80/MSHELOR/Digest-SHA-5.81 A reproducer is given in the upstream bugreport. Does this warrants a CVE? (It's at least a DoS). Regards, Salvatore
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.