Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 513810 (CVE-2014-0477) - <dev-perl/Email-Address-1.905.0: Denial-of-Service in Email::Address::parse (CVE-2014-0477)
Summary: <dev-perl/Email-Address-1.905.0: Denial-of-Service in Email::Address::parse (...
Status: RESOLVED FIXED
Alias: CVE-2014-0477
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-06-19 09:17 UTC by Agostino Sarubbo
Modified: 2014-07-10 21:38 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-06-19 09:17:55 UTC
From ${URL} :

It was discovered [1] that there's a denial of service vulnerability in
Email::Address, a Perl module for RFC 2822 address parsing and
creation[2]. Email::Address::parse uses significant time on parsing
empty quoted string, as allowed by RFC 2822.

Suggested fix was applied upstream as [3]
contained in a new upstream version 1.905[4] which contain additional
commits to avoid slowdowns.

 [1] http://seclists.org/oss-sec/2014/q2/563
 [2] https://metacpan.org/release/Email-Address
 [3] https://github.com/rjbs/Email-Address/commit/83f8306117115729ac9346523762c0c396251eb5
 [4] https://github.com/rjbs/Email-Address/blob/master/Changes


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-07-10 08:41:45 UTC
CVE-2014-0477 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0477):
  The parse function in Email::Address module before 1.905 for Perl uses an
  inefficient regular expression, which allows remote attackers to cause a
  denial of service (CPU consumption) via an empty quoted string in an RFC
  2822 address.
Comment 2 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2014-07-10 10:47:25 UTC
@Security, please vote.
Comment 3 Sergey Popov gentoo-dev 2014-07-10 21:37:14 UTC
GLSA vote: no
Comment 4 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2014-07-10 21:38:49 UTC
GLSA vote: no,