MGASA-2021-0048

Source
https://advisories.mageia.org/MGASA-2021-0048.html
Import Source
https://advisories.mageia.org/MGASA-2021-0048.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0048
Related
Published
2021-01-22T23:50:14Z
Modified
2021-01-22T23:09:55Z
Summary
Updated perl-DBI packages fix security vulnerabilities
Details

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference. (CVE-2019-20919).

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbddblogin6_sv() could cause memory corruption, affecting the service's availability. (CVE-2020-14392).

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data. (CVE-2020-14393).

References
Credits

Affected packages

Mageia:7 / perl-DBI

Package

Name
perl-DBI
Purl
pkg:rpm/mageia/perl-DBI?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.642.0-1.1.mga7

Ecosystem specific

{
    "section": "core"
}