Updated perl-DBD-mysql packages fix security vulnerabilities
Publication date: 14 Jun 2018Modification date: 14 Jun 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-10788 , CVE-2017-10789
Description
Updated perl-DBD-mysql package fixes security vulnerabilities:
The DBD::mysql Perl module through 4.043 for Perl allows remote attackers to
cause a denial of service (use-after-free and application crash) or possibly
have unspecified other impact by triggering certain error responses from a
MySQL server or a loss of a network connection to a MySQL server. The
use-after-free defect was introduced by relying on incorrect Oracle
mysql_stmt_close documentation and code examples (CVE-2017-10788).
The DBD::mysql Perl module, when used with mysql_ssl=1 setting enabled, means
that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which could lead
man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack
(CVE-2017-10789).
References
SRPMS
5/core
- perl-DBD-mysql-4.46.0-1.mga5
6/core
- perl-DBD-mysql-4.46.0-1.mga6