First published: Fri Sep 11 2020(Updated: )
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Dbi | <1.632 | |
Canonical Ubuntu Linux | =14.04 | |
ubuntu/libdbi-perl | <1.630-1ubuntu0.1~ | 1.630-1ubuntu0.1~ |
ubuntu/libdbi-perl | <1.633-1 | 1.633-1 |
debian/libdbi-perl | 1.643-3 1.643-4 1.644-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2013-7490.
The severity of CVE-2013-7490 is medium with a severity value of 5.3.
The affected software for CVE-2013-7490 includes libdbi-perl version 1.642-1+deb10u2, 1.643-3, 1.643-4 on Debian, and libdbi-perl version 1.630-1ubuntu0.1~ on Ubuntu Trusty Tahr (14.04).
To fix CVE-2013-7490, update libdbi-perl to version 1.642-1+deb10u2, 1.643-3, or 1.643-4 on Debian, and version 1.630-1ubuntu0.1~ on Ubuntu Trusty Tahr (14.04).
You can find more information about CVE-2013-7490 in the following references: [GitHub](https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766), [MetaCPAN](https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014), [RT](https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941).