libdbd-mysql-perl (4.025-1ubuntu0.1) trusty-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    use after free
    - debian/patches/CVE-2014-9906.patch: properly handle free in dbdimp.c,
      added test to t/rt85919-fetch-lost-connection.t,
      t/rt86153-reconnect-fail-memory.t.
    - CVE-2014-9906
  * SECURITY UPDATE: denial of service and possible code execution via
    use after free
    - debian/patches/CVE-2015-8949.patch: properly handle free in dbdimp.c.
    - CVE-2015-8949
  * SECURITY UPDATE: unsafe sprintf w/variable length input
    - debian/patches/CVE-2016-1246.patch: don't use sprintf in dbdimp.c.
    - CVE-2016-1246

Date: 2016-10-12 15:29:13.390813+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/libdbd-mysql-perl/4.025-1ubuntu0.1
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to