perl-modperl mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Steve Hay" <>
Subject RE: perl/hash_attack.t fails with 5.10.1 + CVE-2013-1667 fix
Date Fri, 15 Mar 2013 17:56:05 GMT
Steve Hay wrote on 2013-03-14:
> Niko Tyni wrote on 2013-03-13:
>> On Wed, Mar 13, 2013 at 09:13:15AM -0000, Steve Hay wrote:
>>> Dominic Hargreaves wrote on 2013-03-12:
>>>> When trying to fix this issue in Debian stable, I found that the
>>>> patch at
>>>> does not stop the test failing when applied to 2.0.4 (as currently
>>>> found in Debian stable) and built against the current perl package
>>>> in Debian stable (5.10 + the rehashing fix).
>>> I haven't looked at the Debian package, or tried anything with
>>> mod_perl-2.0.4, but I've just checked out origin/maint-5.10 from
>>> the Perl git repo (in fact, I took the snapshot at
>>> 7d d9de577e7918.tar.gz) and tried that with Apache 2.2.22 and
>>> from trunk and the tests all pass for me... (This is on Windows 7
>>> with VC++ 2010.)
>> Thanks for checking.
>> FWIW, I can reproduce the failure with the Debian perl 5.10.1 package
>> and mod_perl2 2.0.7 with just the above test fix. So it doesn't seem
>> be a Debian change that breaks it. Maybe -Dusethreads or something
>> that.
>> I'll keep looking and send an update when I know more.
> The perl I built and tested with was made with ithreads enabled.
> There is an alternative patch to fix this test, submitted to
> mod_perl's queue after I'd applied the patch from the
> perl5-security queue on
> I haven't tried it myself yet, but is that any better for you?

Zefram has now come up with an even better patch (on the same RT
ticket), after reproducing the Debian 5.10.1 failure himself.

Please take a look (I've also attached it here for your convenience) and
let me know whether this works for you. If so then I hope to apply it to
SVN over the weekend.

View raw message