drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in libdbd-firebird-perl
Name: |
Pufferüberlauf in libdbd-firebird-perl |
|
ID: |
DSA-3219-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Sa, 11. April 2015, 16:34 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2788 |
|
Applikationen: |
libdbd-firebird-perl |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3219-1 security@debian.org http://www.debian.org/security/ Alessandro Ghedini April 11, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : libdbd-firebird-perl CVE ID : CVE-2015-2788 Debian Bug : 780925
Stefan Roas discovered a way to cause a buffer overflow in DBD-FireBird, a Perl DBI driver for the Firebird RDBMS, in certain error conditions, due to the use of the sprintf() function to write to a fixed-size memory buffer.
For the stable distribution (wheezy), this problem has been fixed in version 0.91-2+deb7u1.
For the upcoming stable distribution (jessie), this problem has been fixed in version 1.18-2.
For the unstable distribution (sid), this problem has been fixed in version 1.18-2.
We recommend that you upgrade your libdbd-firebird-perl packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJVKPJTAAoJEK+lG9bN5XPLrfkP/2BLZPy1lljAkuYT69CUFEpA LqvaAHU8PSkMhOgKInzfwlHgCGND6a613NRdhSGA6ctmh69qHdW7tJhwwk0vatpS dE2a7K9tFRxHpUaS96x7annDz0M7hDzmHtAwx4LckPO9WSJJtgCf7/N2BwhM24Hz 1L0Q2IxhXDVBQOBU1pUOB7KYY4HoqVvmzQO/MML2wnxqn2SRynKsbMr3Y8jA5mUm Ob+CjRVty7k7Lc7O3qTD8MH5oF67sn2485QDz/pUzkwF4PUd5GU72NXBtjfBiLq4 BsgB/IFDJJOSeW7+J7GzBs2XnI2jQ3d7pCbvVMWGV0B8y3HL0Q+SmNxgRRwdrFyN 6jIDpr85N+mnN7RCb0ezedm1sUbNDelAmV8hr37/+1oKU/3cIeMfCqJIO7jQdrls 8V5IEEY5PekoGzJk6LcvGyTTI+hPzKIKt8i6GKOPDhRnHiCxguviQkFa01AjWi7j PR6uqEca1eGbp6yLtKKglgjci9M9G+JLHCAJh/9q7aptKOTwy+/vZwCFGOkVOWIK 2DStOKtolcfxXiF2Re9VjcjqRDrrfG38ElKwgdM13fx6IIl0olg9iI3De7dfzmDl AMjVt3/OjsmjXP1ybxsfItE9PqDMcfbOF7csHlnr06zHBqTi2Psa4fsqgdTlu6b4 D5NSQJbxU0l3va9YJuWD =XtIL -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/20150411101512.EFB79146@bendel.debian.org
|
|
|
|