First published: Wed Sep 09 2020(Updated: )
A flaw was found in perl-dbi before version 1.643. Macro ST(*) returns pointer to Perl stack. Other Perl functions which use Perl stack (e.g. eval) may reallocate Perl stack and therefore pointer returned by ST(*) macro is invalid which may lead to memory corruption. Upstream patch: <a href="https://github.com/perl5-dbi/dbi/commit/ea99b6aafb437db53c28fd40d5eafbe119cd66e1">https://github.com/perl5-dbi/dbi/commit/ea99b6aafb437db53c28fd40d5eafbe119cd66e1</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Database Interface | <1.643 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =9.0 | |
redhat/perl-DBI | <1.643 | 1.643 |
debian/libdbi-perl | 1.643-3 1.643-4 1.645-1 | |
Fedora | =31 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14392 is a vulnerability found in Perl-DBI < 1.643 that allows a local attacker to cause memory corruption, affecting the service's availability.
CVE-2020-14392 has a severity score of 5.5, which is classified as medium severity.
Perl-DBI versions earlier than 1.643 are affected by CVE-2020-14392.
A local attacker can exploit CVE-2020-14392 by manipulating calls to dbd_db_login6_sv() to cause memory corruption.
Yes, the Debian package libdbi-perl versions 1.642-1+deb10u2, 1.643-3, and 1.643-4 provide remedies for CVE-2020-14392.