Описание
Security update for perl-DBD-mysql
This update for perl-DBD-mysql fixes the following issues:
- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional (even though this setting's documentation has a 'your communication with the server will be encrypted' statement), which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. (bsc#1047059)
- CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)
Список пакетов
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP3
Ссылки
- Link for SUSE-SU-2018:1450-1
- E-Mail link for SUSE-SU-2018:1450-1
- SUSE Security Ratings
- SUSE Bug 1047059
- SUSE Bug 1047095
- SUSE CVE CVE-2017-10788 page
- SUSE CVE CVE-2017-10789 page
Описание
The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples.
Затронутые продукты
Ссылки
- CVE-2017-10788
- SUSE Bug 1047095
Описание
The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
Затронутые продукты
Ссылки
- CVE-2017-10789
- SUSE Bug 1047059
- SUSE Bug 924663
- SUSE Bug 928962