{"id":"MGASA-2016-0300","summary":"Updated perl-DBD-mysql packages fix security vulnerability","details":"Two use-after-free vulnerabilities were discovered in DBD::mysql. A remote\nattacker can take advantage of these flaws to cause a denial-of-service\nagainst an application using DBD::mysql (application crash), or\npotentially to execute arbitrary code with the privileges of the user\nrunning the application(CVE-2014-9906, CVE-2015-8949).\n","modified":"2026-04-16T01:47:49.450452497Z","published":"2016-09-16T09:27:13Z","upstream":["CVE-2014-9906","CVE-2015-8949"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0300.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19050"},{"type":"WEB","url":"https://www.debian.org/security/2016/dsa-3635"}],"affected":[{"package":{"name":"perl-DBD-mysql","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/perl-DBD-mysql?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.28.0-3.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0300.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}