https://bugzilla.redhat.com/show_bug.cgi?id=1821879

            Bug ID: 1821879
           Summary: CVE-2013-7488 perl-Convert-ASN1: allows remote
                    attackers to cause an infinite loop via unexpected
                    input
           Product: Security Response
          Hardware: All
                OS: Linux
            Status: NEW
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: gsuck...@redhat.com
                CC: caillon+fedoraproj...@gmail.com, caol...@redhat.com,
                    john.j5l...@gmail.com, jples...@redhat.com,
                    ka...@ucw.cz, perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    psab...@redhat.com, rhug...@redhat.com,
                    rstr...@redhat.com, sandm...@redhat.com
  Target Milestone: ---
    Classification: Other



perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows
remote attackers to cause an infinite loop via unexpected input.

Reference:
https://github.com/gbarr/perl-Convert-ASN1/issues/14


-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org

Reply via email to