https://bugzilla.redhat.com/show_bug.cgi?id=1877421

            Bug ID: 1877421
           Summary: perl-dbi: Old API functions vulnerable to overflow
           Product: Security Response
          Hardware: All
                OS: Linux
            Status: NEW
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: psamp...@redhat.com
                CC: caillon+fedoraproj...@gmail.com, hho...@redhat.com,
                    john.j5l...@gmail.com, jor...@redhat.com,
                    jples...@redhat.com, ka...@ucw.cz,
                    perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    rhug...@redhat.com, rstr...@redhat.com,
                    sandm...@redhat.com
  Target Milestone: ---
    Classification: Other



A flaw was found in perl-dbi before version 1.643. Old API functions might be
vulnerable to overflowing potentially causing memory corruption.

References:

https://github.com/perl5-dbi/dbi/commit/00e2ec459b55b72ee5703c1bd8e6cf57f1986c05


-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org

Reply via email to