SUSE-SU-2018:1450-1: moderate: Security update for perl-DBD-mysql

sle-security-updates at sle-security-updates at
Mon May 28 10:07:47 MDT 2018

   SUSE Security Update: Security update for perl-DBD-mysql

Announcement ID:    SUSE-SU-2018:1450-1
Rating:             moderate
References:         #1047059 #1047095 
Cross-References:   CVE-2017-10788 CVE-2017-10789
Affected Products:
                    SUSE Linux Enterprise Server 12-SP3

   An update that fixes two vulnerabilities is now available.


   This update for perl-DBD-mysql fixes the following issues:

   - CVE-2017-10789: The DBD::mysql module when with mysql_ssl=1 setting
     enabled, means that SSL is optional (even though this setting's
     documentation has a \"your communication with the server will be
     encrypted\" statement), which could lead man-in-the-middle attackers to
     spoof servers via a cleartext-downgrade attack, a related issue to
     CVE-2015-3152. (bsc#1047059)
   - CVE-2017-10788: The DBD::mysql module through 4.043 for Perl allows
     remote attackers to cause a denial of service (use-after-free and
     application crash) or possibly have unspecified other impact by
     triggering (1) certain error responses from a MySQL server or (2) a loss
     of a network connection to a MySQL server. The use-after-free defect was
     introduced by relying on incorrect Oracle mysql_stmt_close documentation
     and code examples. (bsc#1047095)

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-991=1

Package List:

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):



More information about the sle-security-updates mailing list