CVE-2020-14392

An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:perl:database_interface:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:03

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html - Mailing List, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1877402 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1877402 - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/ -
References () https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 - Release Notes, Third Party Advisory () https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643 - Release Notes, Third Party Advisory
References () https://usn.ubuntu.com/4503-1/ - Third Party Advisory () https://usn.ubuntu.com/4503-1/ - Third Party Advisory

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/', 'name': 'FEDORA-2020-f30298614a', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/ -

Information

Published : 2020-09-16 13:15

Updated : 2024-11-21 05:03


NVD link : CVE-2020-14392

Mitre link : CVE-2020-14392

CVE.ORG link : CVE-2020-14392


JSON object : View

Products Affected

fedoraproject

  • fedora

debian

  • debian_linux

opensuse

  • leap

perl

  • database_interface

canonical

  • ubuntu_linux
CWE
CWE-822

Untrusted Pointer Dereference

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer