openSUSE Security Update: Security update for perl-DBD-mysql ______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1463-1 Rating: moderate References: #1047059 #1047095 Cross-References: CVE-2017-10788 CVE-2017-10789 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for perl-DBD-mysql fixes the following issues:
- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. (bsc#1047059) - CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)
This update was imported from the SUSE:SLE-12:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-539=1
Package List:
- openSUSE Leap 42.3 (x86_64):
perl-DBD-mysql-4.021-18.3.1 perl-DBD-mysql-debuginfo-4.021-18.3.1 perl-DBD-mysql-debugsource-4.021-18.3.1
References:
https://www.suse.com/security/cve/CVE-2017-10788.html https://www.suse.com/security/cve/CVE-2017-10789.html https://bugzilla.suse.com/1047059 https://bugzilla.suse.com/1047095
security-announce@lists.opensuse.org