https://bugzilla.redhat.com/show_bug.cgi?id=1877402
Bug ID: 1877402
Summary: perl-dbi: Memory corruption in XS functions when Perl
stack is reallocated
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: psampaio(a)redhat.com
CC: caillon+fedoraproject(a)gmail.com, hhorak(a)redhat.com,
john.j5live(a)gmail.com, jorton(a)redhat.com,
jplesnik(a)redhat.com, kasal(a)ucw.cz,
perl-devel(a)lists.fedoraproject.org,
perl-maint-list(a)redhat.com, ppisar(a)redhat.com,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Other
A flaw was found in perl-dbi. Macro ST(*) returns pointer to Perl stack. Other
Perl functions which use Perl stack (e.g. eval) may reallocate Perl stack and
therefore pointer returned by ST(*) macro is invalid which may lead to memory
corruption.
Upstream patch:
https://github.com/perl5-dbi/dbi/commit/ea99b6aafb437db53c28fd40d5eafbe11...
--
You are receiving this mail because:
You are on the CC list for the bug.