https://bugzilla.redhat.com/show_bug.cgi?id=1467600

            Bug ID: 1467600
           Summary: CVE-2017-10788 perl-DBD-MySQL: Use-after-free when
                    calling mysql_stmt_error() after mysql_stmt_close()
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: ama...@redhat.com
                CC: hho...@redhat.com, jor...@redhat.com,
                    jples...@redhat.com,
                    perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    psab...@redhat.com



The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a
denial of service (use-after-free and application crash) or possibly have
unspecified other impact by triggering (1) certain error responses from a MySQL
server or (2) a loss of a network connection to a MySQL server. The
use-after-free defect was introduced by relying on incorrect Oracle
mysql_stmt_close documentation and code examples.

Upstream bug:

https://github.com/perl5-dbi/DBD-mysql/issues/120

References:

http://seclists.org/oss-sec/2017/q2/443

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org

Reply via email to