Updated perl-DBD-mysql packages fix security vulnerabilities
Publication date: 14 Jun 2018Modification date: 14 Jun 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2017-10788 , CVE-2017-10789
Description
Updated perl-DBD-mysql package fixes security vulnerabilities: The DBD::mysql Perl module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering certain error responses from a MySQL server or a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples (CVE-2017-10788). The DBD::mysql Perl module, when used with mysql_ssl=1 setting enabled, means that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack (CVE-2017-10789).
References
SRPMS
6/core
- perl-DBD-mysql-4.46.0-1.mga6
5/core
- perl-DBD-mysql-4.46.0-1.mga5