The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples. Upstream bug: https://github.com/perl5-dbi/DBD-mysql/issues/120 References: http://seclists.org/oss-sec/2017/q2/443
Created perl-DBD-MySQL tracking bugs for this issue: Affects: fedora-all [bug 1467608]
Patch: https://github.com/perl5-dbi/DBD-mysql/files/1116951/0001-Fix-use-after-free-after-calling-mysql_stmt_close.patch.txt
Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.