Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Register
  • Sign in
  • aports aports
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Graph
    • Compare
  • Issues 662
    • Issues 662
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 309
    • Merge requests 309
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • alpinealpine
  • aportsaports
  • Issues
  • #10435
Closed
Open
Issue created May 09, 2019 by Alicha CH@alichaReporter

[3.7] perl-email-address: DOS vulnerability in perl module Email::Address (CVE-2018-12558)

The parse() method in the Email::Address module through 1.909 for Perl is vulnerable
to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared
special input that caused this problem contained 30 form-field characters (“\f”).

References:

https://nvd.nist.gov/vuln/detail/CVE-2018-12558
https://www.openwall.com/lists/oss-security/2018/06/19/3

Patch:

https://github.com/Perl-Email-Project/Email-Address/commit/aeaf0d7f1b0897b54cb246b8ac15d3ef177e5cae

(from redmine: issue id 10435, created on 2019-05-09, closed on 2019-06-06)

  • Relations:
    • parent #10430 (closed)
  • Changesets:
    • Revision 18070a9b on 2019-06-05T12:38:19Z:
main/perl-email-address: security upgrade to 1.912 (CVE-2018-12558)

Fixes #10435
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking