Bug 1877409 (CVE-2020-14393)

Summary: CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: caillon+fedoraproject, hhorak, john.j5live, jorton, jplesnik, kasal, perl-devel, perl-maint-list, ppisar, rhughes, rstrode, vondruch
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: perl-DBI 1.643 Doc Type: If docs needed, set a value
Doc Text:
A buffer overflow was found in perl-DBI before version 1.643 in DBI.xs. This flaw allows a local attacker who can supply a string longer than 300 characters to cause an out-of-bounds write. The highest threat from this vulnerability is to integrity and system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-02 17:26:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1877410, 1877956, 1877957, 1877958, 1877959    
Bug Blocks: 1857388    

Description Pedro Sampaio 2020-09-09 14:59:43 UTC
A flaw was found in perl-dbi before version 1.643. A buffer overflow on via an overlong DBD class name in dbih_setup_handle function may lead to data be written past the intended limit.

Upstream patch:

https://github.com/perl5-dbi/dbi/commit/36f2a2c5fea36d7d47d6871e420286643460e71b

Comment 1 Pedro Sampaio 2020-09-09 15:00:15 UTC
Created perl-DBI tracking bugs for this issue:

Affects: fedora-all [bug 1877410]

Comment 4 Todd Cullum 2020-09-10 21:12:11 UTC
External References:

Advisory: https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-...

Comment 5 Todd Cullum 2020-09-28 15:51:55 UTC
Marked the CVSS score as 4.4 for products as there would only be a temporary risk to availability and low risk to data integrity due to binary protections shipped with the products.