Описание
Security update for perl-DBI
This update for perl-DBI fixes the following issues:
Security issues fixed:
- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
Список пакетов
SUSE Linux Enterprise Point of Sale 11 SP3
perl-DBI-1.607-3.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS
perl-DBI-1.607-3.3.1
Ссылки
- Link for SUSE-SU-2020:14493-1
- E-Mail link for SUSE-SU-2020:14493-1
- SUSE Security Ratings
- SUSE Bug 1176409
- SUSE Bug 1176412
- SUSE CVE CVE-2020-14392 page
- SUSE CVE CVE-2020-14393 page
Описание
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:perl-DBI-1.607-3.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS:perl-DBI-1.607-3.3.1
Ссылки
- CVE-2020-14392
- SUSE Bug 1176412
Описание
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:perl-DBI-1.607-3.3.1
SUSE Linux Enterprise Server 11 SP4-LTSS:perl-DBI-1.607-3.3.1
Ссылки
- CVE-2020-14393
- SUSE Bug 1176409