openSUSE Security Update: Security update for perl-DBD-mysql
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:1463-1
Rating:             moderate
References:         #1047059 #1047095 
Cross-References:   CVE-2017-10788 CVE-2017-10789
Affected Products:
                    openSUSE Leap 42.3
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for perl-DBD-mysql fixes the following issues:

   - CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting
     enabled, means that SSL is optional (even though this setting's
     documentation has a \"your communication with the server will be
     encrypted\" statement), which could lead man-in-the-middle attackers to
     spoof servers via a cleartext-downgrade attack, a related issue to
     CVE-2015-3152. (bsc#1047059)
   - CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows
     remote attackers to cause a denial of service (use-after-free and
     application crash) or possibly have unspecified other impact by
     triggering (1) certain error responses from a MySQL server or (2) a loss
     of a network connection to a MySQL server. The use-after-free defect was
     introduced by relying on incorrect Oracle mysql_stmt_close documentation
     and code examples. (bsc#1047095)

   This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-539=1



Package List:

   - openSUSE Leap 42.3 (x86_64):

      perl-DBD-mysql-4.021-18.3.1
      perl-DBD-mysql-debuginfo-4.021-18.3.1
      perl-DBD-mysql-debugsource-4.021-18.3.1


References:

   https://www.suse.com/security/cve/CVE-2017-10788.html
   https://www.suse.com/security/cve/CVE-2017-10789.html
   https://bugzilla.suse.com/1047059
   https://bugzilla.suse.com/1047095

-- 

openSUSE: 2018:1463-1: moderate: perl-DBD-mysql

May 29, 2018
An update that fixes two vulnerabilities is now available.

Description

This update for perl-DBD-mysql fixes the following issues: - CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional (even though this setting's documentation has a \"your communication with the server will be encrypted\" statement), which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. (bsc#1047059) - CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095) This update was imported from the SUSE:SLE-12:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-539=1


Package List

- openSUSE Leap 42.3 (x86_64): perl-DBD-mysql-4.021-18.3.1 perl-DBD-mysql-debuginfo-4.021-18.3.1 perl-DBD-mysql-debugsource-4.021-18.3.1


References

https://www.suse.com/security/cve/CVE-2017-10788.html https://www.suse.com/security/cve/CVE-2017-10789.html https://bugzilla.suse.com/1047059 https://bugzilla.suse.com/1047095--


Severity
Announcement ID: openSUSE-SU-2018:1463-1
Rating: moderate
Affected Products: openSUSE Leap 42.3

Related News