> I've not seen much (any?) traffic on this list recently.  Is this list still 
> alive?

The DBI is very, um, stable.

> Is there a new release of DBI with the fix in place that I missed?

Yes, 1.643. It's not made very clear though.

CVE-2020-14392 
<https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-14392.html> 
says "An untrusted pointer dereference flaw was found in Perl-DBI < 1.643" 
(note the "<")

The changes <https://metacpan.org/changes/distribution/DBI> for the 1.643 
release include several fixes from Pali and Petr. (Thanks!)

Tim.

> On 16 Sep 2020, at 18:25, Jonathan Leffler <jonathan.leff...@gmail.com> wrote:
> 
> I've not seen much (any?) traffic on this list recently.  Is this list still 
> alive?
> 
> This message arrived from Canonical/Ubuntu about a fixed bug in DBI — 
> numerous versions thereof (1.640, 1.634, 1.630, 1.616).
> 
> Is there a new release of DBI with the fix in place that I missed?
> 
> 
> ---------- Forwarded message ---------
> From: Leonidas S. Barbosa <leo.barb...@canonical.com 
> <mailto:leo.barb...@canonical.com>>
> Date: Wed, Sep 16, 2020 at 8:15 AM
> Subject: [USN-4503-1] Perl DBI module vulnerability
> To: <ubuntu-security-annou...@lists.ubuntu.com 
> <mailto:ubuntu-security-annou...@lists.ubuntu.com>>
> 
> 
> ==========================================================================
> Ubuntu Security Notice USN-4503-1
> September 16, 2020
> 
> libdbi-perl vulnerability
> ==========================================================================
> 
> A security issue affects these releases of Ubuntu and its derivatives:
> 
> - Ubuntu 18.04 LTS
> - Ubuntu 16.04 LTS
> - Ubuntu 14.04 ESM
> - Ubuntu 12.04 ESM
> 
> Summary:
> 
> Perl DBI module could be made to execute arbitrary code if it received a
> specially manipulated call.
> 
> Software Description:
> - libdbi-perl: Perl Database Interface (DBI)
> 
> Details:
> 
> It was discovered that Perl DBI module incorrectly handled certain calls.
> An attacker could possibly use this issue to execute arbitrary code.
> 
> Update instructions:
> 
> The problem can be corrected by updating your system to the following
> package versions:
> 
> Ubuntu 18.04 LTS:
>   libdbi-perl                     1.640-1ubuntu0.1
> 
> Ubuntu 16.04 LTS:
>   libdbi-perl                     1.634-1ubuntu0.1
> 
> Ubuntu 14.04 ESM:
>   libdbi-perl                     1.630-1ubuntu0.1~esm1
> 
> Ubuntu 12.04 ESM:
>   libdbi-perl                     1.616-1ubuntu0.1
> 
> In general, a standard system update will make all the necessary changes.
> 
> References:
>   https://usn.ubuntu.com/4503-1 <https://usn.ubuntu.com/4503-1>
>   CVE-2020-14392
> 
> Package Information:
>   https://launchpad.net/ubuntu/+source/libdbi-perl/1.640-1ubuntu0.1 
> <https://launchpad.net/ubuntu/+source/libdbi-perl/1.640-1ubuntu0.1>
>   https://launchpad.net/ubuntu/+source/libdbi-perl/1.634-1ubuntu0.1 
> <https://launchpad.net/ubuntu/+source/libdbi-perl/1.634-1ubuntu0.1>
> -- 
> ubuntu-security-announce mailing list
> ubuntu-security-annou...@lists.ubuntu.com 
> <mailto:ubuntu-security-annou...@lists.ubuntu.com>
> Modify settings or unsubscribe at: 
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce 
> <https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce>
> 
> 
> -- 
> Jonathan Leffler <jonathan.leff...@gmail.com 
> <mailto:jonathan.leff...@gmail.com>>  #include <disclaimer.h>
> Guardian of DBD::Informix - v2018.1031 - http://dbi.perl.org 
> <http://dbi.perl.org/>
> "Blessed are we who can laugh at ourselves, for we shall never cease to be 
> amused."
> <signature.asc>

Reply via email to