Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1395591 - (CVE-2016-1249) CVE-2016-1249 perl-DBD-MySQL: Out-of-bounds read when using server-side prepared statement support
CVE-2016-1249 perl-DBD-MySQL: Out-of-bounds read when using server-side prepa...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20161115,repor...
: Security
Depends On: 1395592
Blocks: 1395597
  Show dependency treegraph
 
Reported: 2016-11-16 04:38 EST by Andrej Nemec
Modified: 2016-12-18 23:41 EST (History)
12 users (show)

See Also:
Fixed In Version: perl-DBD-MySQL 4.039
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-12-18 23:41:48 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2016-11-16 04:38:06 EST
A vulnerability was discovered in perl-DBD-MySQL that can lead to an out-of-bounds read when using server side prepared statements with an unaligned number of placeholders in WHERE condition and output fields in SELECT expression.

This problem is only exposed when the user uses server-side prepared statement support, which is NOT default behavior and was turned off back for all drivers per MySQL AB decision in 2006 due to issues with server-side prepared statements in the server. The behavior of the driver is normally emulated.

References:

http://seclists.org/oss-sec/2016/q4/433

Upstream patch:

https://github.com/perl5-dbi/DBD-mysql/commit/793b72b1a0baa5070adacaac0e12fd995a6fbabe
Comment 1 Andrej Nemec 2016-11-16 04:38:57 EST
Created perl-DBD-MySQL tracking bugs for this issue:

Affects: fedora-all [bug 1395592]

Note You need to log in before you can comment on or make changes to this bug.