==========================================================================
Ubuntu Security Notice USN-3103-1
October 13, 2016
libdbd-mysql-perl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
DBD::mysql could be made to crash or run programs if it received specially
crafted input.
Software Description:
– libdbd-mysql-perl: Perl5 database interface to the MySQL database
Details:
It was discovered that DBD::mysql incorrectly handled certain memory
operations. A remote attacker could use this issue to cause DBD::mysql to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2014-9906)
Hanno Böck discovered that DBD::mysql incorrectly handled certain memory
operations. A remote attacker could use this issue to cause DBD::mysql to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2015-8949)
Pali Rohár discovered that DBD::mysql incorrectly handled certain user
supplied data. A remote attacker could use this issue to cause DBD::mysql
to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2016-1246)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libdbd-mysql-perl 4.025-1ubuntu0.1
Ubuntu 12.04 LTS:
libdbd-mysql-perl 4.020-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3103-1
CVE-2014-9906, CVE-2015-8949, CVE-2016-1246
Package Information:
https://launchpad.net/ubuntu/+source/libdbd-mysql-perl/4.025-1ubuntu0.1
https://launchpad.net/ubuntu/+source/libdbd-mysql-perl/4.020-1ubuntu0.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJX/59kAAoJEGVp2FWnRL6TBDAP/jAVVZvbXn4jCzMGC7bZino7
dATxd/o/LI+mIDBz2XMn0Oz7a3CmrdYx0H9B0eHuTnWp5oy9u6pVVCR6GVqx5SrM
z5whMtQwDfgaFtIMY0QAgPQEuBrZzeCdPSZKQqZfWOJr47f3nrQB39WLWC3F73QC
DduaMA8vjaITiER0MkURAYYGkpVCRR8QnHTBMjmMfavFaeFKQd5ZskZFBMOOJFMX
mOCggIuRHDj46lMM9VSbuv8RT6Hfw9yxF2NwgZoTA7r1nejCbGyrgqfEkrJBMlu8
MbkjcXwp4CQftIn5ZBNqVz0ugbg4WFUbRLJi+hhwrUzhOsb7g5NXDtIOL5VggJAd
DTGiMMt9C369JjZLGWDX4DbmC+ai45kWvN+Rig/6xKRWK38RB0hHARMOkqahoEF1
xDMGiMAGhDrOtOvWW4ItyBmPJci03NOkOohySEyxPhiklT9a4yjqfvzrpJzKxKAH
Lq/25BP4M0XAXFM+bKVYdy+7/NdzHmjIoQMszfnrDm8a9sfUA+wnDDcx6uopJOJS
648qelvUxKEBRHA77WwMivB9P5bqRL0tqSoe7x41B6vBdqjTFx/z0+APJYCBz0rP
hmW3mRQU+IFRjjOb+pphwOC3sTMcHVGoMg2s47bRdT5qxSZebNGZRzN6u0qb0Axx
eUXzLjVOztFMg6o/ds5l
=9Vzw
—–END PGP SIGNATURE—–
—