Bug 1877402 (CVE-2020-14392) - CVE-2020-14392 perl-dbi: Memory corruption in XS functions when Perl stack is reallocated
Summary: CVE-2020-14392 perl-dbi: Memory corruption in XS functions when Perl stack is...
Alias: CVE-2020-14392
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1877403 1877496 1877497 1877498 1877499
Blocks: 1857388
TreeView+ depends on / blocked
Reported: 2020-09-09 14:47 UTC by Pedro Sampaio
Modified: 2023-09-25 06:11 UTC (History)
12 users (show)

Fixed In Version: perl-DBI 1.643
Doc Type: If docs needed, set a value
Doc Text:
An untrusted pointer dereference flaw was found in Perl-DBI before version 1.643. This flaw allows a local attacker who can manipulate calls to dbd_db_login6_sv() to cause memory corruption. The highest threat from this vulnerability is to system availability.
Clone Of:
Last Closed: 2021-11-02 17:24:39 UTC

Attachments (Terms of Use)

Description Pedro Sampaio 2020-09-09 14:47:19 UTC
A flaw was found in perl-dbi before version 1.643. Macro ST(*) returns pointer to Perl stack. Other Perl functions which use Perl stack (e.g. eval) may reallocate Perl stack and therefore pointer returned by ST(*) macro is invalid which may lead to memory corruption.

Upstream patch:


Comment 1 Pedro Sampaio 2020-09-09 14:48:05 UTC
Created perl-DBI tracking bugs for this issue:

Affects: fedora-all [bug 1877403]

Comment 2 Petr Pisar 2020-09-09 15:28:37 UTC
The fix is included in DBI-1.643 upstream release.

Comment 5 Todd Cullum 2020-09-10 21:23:17 UTC
External References:

Advisory: https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643-...

Note You need to log in before you can comment on or make changes to this bug.