openSUSE Security Update: Security update for perl-DBD-mysql ______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1463-1 Rating: moderate References: #1047059 #1047095 Cross-References: CVE-2017-10788 CVE-2017-10789 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
This update for perl-DBD-mysql fixes the following issues:
- CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting enabled, means that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which could lead man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. (bsc#1047059) - CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. (bsc#1047095)
This update was imported from the SUSE:SLE-12:Update update project.
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-539=1
- openSUSE Leap 42.3 (x86_64):
perl-DBD-mysql-4.021-18.3.1 perl-DBD-mysql-debuginfo-4.021-18.3.1 perl-DBD-mysql-debugsource-4.021-18.3.1