From secunia security advisory at $URL: Description: 1) A format string error exists within the "pg_warn()" function (dbdimp.c) when handling database notices. 2) A format string error exists within the "dbd_st_prepare()" function (dbdimp.c) when preparing DBD statements. Successful exploitation of the vulnerabilities may allow execution of arbitrary code but requires connecting to a malicious database server. The vulnerabilities are reported in version 2.18.1. Other versions may also be affected. Solution Do not connect to untrusted database servers.
2.19.0 is in the tree. +Version 2.19.0 Released March 9, 2012 + + - Use proper formatting for warn() and croak() (CPAN bug #75642) + [Niko Tyni]
(In reply to comment #1) > 2.19.0 is in the tree. Thanks, Arches, please test and mark stable: =dev-perl/DBD-Pg-2.19.0 Target KEYWORDS : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
ppc done
x86: ok
ppc64 done
amd64 stable
x86 stable
Stable for HPPA.
alpha/arm/ia64/s390/sh/sparc stable
Thanks, everyone. Filing new GLSA request.
Ago, is CVE-2012-1152 correct here? Looks like it should be against dev-perl/YAML-LibYAML? http://www.openwall.com/lists/oss-security/2012/03/10/4
(In reply to comment #11) > Ago, is CVE-2012-1152 correct here? Looks like it should be against > dev-perl/YAML-LibYAML? > > http://www.openwall.com/lists/oss-security/2012/03/10/4 should be ok now :)
This issue was resolved and addressed in GLSA 201204-08 at http://security.gentoo.org/glsa/glsa-201204-08.xml by GLSA coordinator Sean Amoss (ackle).
CVE-2012-1151 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1151): Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.