[Bug 1632833] Re: Please add patch for CVE-2016-1246 buffer overflow

Marc Deslauriers marc.deslauriers at canonical.com
Thu Oct 13 14:52:59 UTC 2016


Updated have been published. Thanks!

** Information type changed from Private Security to Public Security

** Changed in: libdbd-mysql-perl (Ubuntu)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to libdbd-mysql-perl in Ubuntu.
https://bugs.launchpad.net/bugs/1632833

Title:
  Please add patch for CVE-2016-1246 buffer overflow

Status in libdbd-mysql-perl package in Ubuntu:
  Fix Released

Bug description:
  Hi, I'm the upstream maintainer of DBD::mysql which is packaged in
  Ubuntu as libdbd-mysql-perl.

  Please note there was a buffer overflow vulnerability discovered and
  patched with CVE-2016-1246. Debian backported the patch to Jessie:

  http://metadata.ftp-master.debian.org/changelogs//main/libd/libdbd-
  mysql-perl/libdbd-mysql-perl_4.028-2+deb8u2_changelog

  But the version in Xenial and Trusty still contains the issue.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libdbd-mysql-perl/+bug/1632833/+subscriptions



More information about the foundations-bugs mailing list