Debian 10222 Published by

A libdbi-perl security update has been released for Debian GNU/Linux 8 Extended LTS to address several vulnerabilities in the Perl5 Database Interface (DBI).



ELA-285-1 libdbi-perl security update

Package libdbi-perl
Version 1.631-3+deb8u1
Related CVEs CVE-2013-7490 CVE-2014-10401 CVE-2019-20919 CVE-2020-14392 CVE-2020-14393
Several vulnerabilities were discovered in the Perl5 Database Interface (DBI). An attacker could trigger a denial-of-service (DoS), information disclosure and possibly execute arbitrary code.

CVE-2013-7490

Using many arguments to methods for Callbacks may lead to memory corruption.

CVE-2014-10401

DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.

CVE-2019-20919

The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

CVE-2020-14392

An untrusted pointer dereference flaw was found in Perl-DBI. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service’s availability.

CVE-2020-14393

A buffer overflow on via an overlong DBD class name in dbih_setup_handle function may lead to data be written past the intended limit.

For Debian 8 jessie, these problems have been fixed in version 1.631-3+deb8u1.

We recommend that you upgrade your libdbi-perl packages.

Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/

  ELA-285-1 libdbi-perl security update