[Bug 1632833] Re: Please add patch for CVE-2016-1246 buffer overflow
Marc Deslauriers
marc.deslauriers at canonical.com
Thu Oct 13 14:52:59 UTC 2016
Updated have been published. Thanks!
** Information type changed from Private Security to Public Security
** Changed in: libdbd-mysql-perl (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to libdbd-mysql-perl in Ubuntu.
https://bugs.launchpad.net/bugs/1632833
Title:
Please add patch for CVE-2016-1246 buffer overflow
Status in libdbd-mysql-perl package in Ubuntu:
Fix Released
Bug description:
Hi, I'm the upstream maintainer of DBD::mysql which is packaged in
Ubuntu as libdbd-mysql-perl.
Please note there was a buffer overflow vulnerability discovered and
patched with CVE-2016-1246. Debian backported the patch to Jessie:
http://metadata.ftp-master.debian.org/changelogs//main/libd/libdbd-
mysql-perl/libdbd-mysql-perl_4.028-2+deb8u2_changelog
But the version in Xenial and Trusty still contains the issue.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libdbd-mysql-perl/+bug/1632833/+subscriptions
More information about the foundations-bugs
mailing list