Debian alert DLA-1079-1 (libdbd-mysql-perl)
| From: | Antoine Beaupre <anarcat@debian.org> | |
| To: | debian-lts-announce@lists.debian.org | |
| Subject: | [SECURITY] [DLA 1079-1] libdbd-mysql-perl security update | |
| Date: | Thu, 31 Aug 2017 07:58:27 -0400 | |
| Message-ID: | <20170831115827.eaciz7h6g7ecl5jh@curie.anarc.at> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : libdbd-mysql-perl Version : 4.021-1+deb7u3 CVE ID : CVE-2017-10788 CVE-2017-10789 Debian Bug : 866818 866821 The Perl library for communicating with MySQL database, used in the "mysql" commandline client is vulnerable to a man in the middle attack in SSL configurations and remote crash when connecting to hostile servers. CVE-2017-10788 The DBD::mysql module through 4.042 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. CVE-2017-10789 The DBD::mysql module through 4.042 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. For Debian 7 "Wheezy", these problems have been fixed in version 4.021-1+deb7u3. We recommend that you upgrade your libdbd-mysql-perl packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEjckBzmQUbASK1Q+7eSFSUnt1kh4FAlmn+b0ACgkQeSFSUnt1 kh6b/Q/+JT9Hk7IVblZalcPC5Hi/UmeJFBaKox+5gHFtq6uvgq6se0oLMzpcxzc1 VhU0UM0OvGZFgTEQ/eRaC8+7Z2NgMLylUqH2jss/yco3mHniwhlHIgzjXvGc/z+/ KsXD25gZjTQ+vRfhcDZZD3cKqtbVthSKW/r0FA4FyjU77kvF2MdLbfF8qeUS9DoZ uCgi8qLr/RP1qlTKtU9waYQ37d6lb4d1HCId/TWmUu0LlIX8kCDN3JsEu9HsZ2ui AjTjE4it8E2sv5bpoMIabB6ANxn40UOfqSsT6pD8Z/QjUdKnkck72ATYaz2gUC3x N3CvW9Z/1LXMMGjzl5pyJJLPr+KiOd1ZkwFqVBPXw0pjJDUlR3QPV0hCm8shDhBS wv7Q5UYDjFwhNtW8J52i7pMZV1UhlNreWyJVAzqKlh2X8cpoqa2EeqPmACX02l7h WRbo9YZtVbgyNabtiG7fxF+ITINZzOtU8BnQOxSPOAbBGANh1sDPjtqBNh1zdTrY zC+P1JMzwxPOsWGAVp2c0/VPu56fdzdXP1Rv/7Rbmy4CUuoTUcFdT88257SqNMe6 Lg7PMhgBWyKIF92QaHNLPdxxygqgN3IRX61A1DpyZ6oQr6AbO3+4nFumhI4/n59p laRtVYr8sCkwvxqG7lebWvCe7jeQNelkD9uECxSTsC4bAIvuows= =rAeH -----END PGP SIGNATURE-----
