DSA-3219-1 libdbd-firebird-perl -- security update

Related Vulnerabilities: CVE-2015-2788  

Stefan Roas discovered a way to cause a buffer overflow in DBD-FireBird, a Perl DBI driver for the Firebird RDBMS, in certain error conditions, due to the use of the sprintf() function to write to a fixed-size memory buffer. For the stable distribution (wheezy), this problem has been fixed in version 0.91-2+deb7u1. For the upcoming stable distribution (jessie), this problem has been fixed in version 1.18-2. For the unstable distribution (sid), this problem has been fixed in version 1.18-2. We recommend that you upgrade your libdbd-firebird-perl packages.

Debian Security Advisory

DSA-3219-1 libdbd-firebird-perl -- security update

Date Reported:
11 Apr 2015
Affected Packages:
libdbd-firebird-perl
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 780925.
In Mitre's CVE dictionary: CVE-2015-2788.
More information:

Stefan Roas discovered a way to cause a buffer overflow in DBD-FireBird, a Perl DBI driver for the Firebird RDBMS, in certain error conditions, due to the use of the sprintf() function to write to a fixed-size memory buffer.

For the stable distribution (wheezy), this problem has been fixed in version 0.91-2+deb7u1.

For the upcoming stable distribution (jessie), this problem has been fixed in version 1.18-2.

For the unstable distribution (sid), this problem has been fixed in version 1.18-2.

We recommend that you upgrade your libdbd-firebird-perl packages.