https://bugzilla.redhat.com/show_bug.cgi?id=1877447

            Bug ID: 1877447
           Summary: perl-dbi: Stack corruption on callbacks
           Product: Security Response
          Hardware: All
                OS: Linux
            Status: NEW
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: security-response-t...@redhat.com
          Reporter: psamp...@redhat.com
                CC: caillon+fedoraproj...@gmail.com, hho...@redhat.com,
                    john.j5l...@gmail.com, jor...@redhat.com,
                    jples...@redhat.com, ka...@ucw.cz,
                    perl-devel@lists.fedoraproject.org,
                    perl-maint-l...@redhat.com, ppi...@redhat.com,
                    rhug...@redhat.com, rstr...@redhat.com,
                    sandm...@redhat.com
  Target Milestone: ---
    Classification: Other



A flaw was found in perl-dbi before version 1.628. A problem occurs when a
user-defined function requires a non-trivial amount of memory and the perl
stack gets reallocated.

References:

https://rt.cpan.org/Public/Bug/Display.html?id=85562

Upstream patch:

https://github.com/perl5-dbi/dbi/commit/401f1221311c71f760e21c98772f0f7e3cbead1d


-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/perl-devel@lists.fedoraproject.org

Reply via email to