lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Y2e25-0001sQ-4P@master.debian.org>
Date: Sun, 21 Dec 2014 10:46:41 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3109-1] firebird2.5 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3109-1                   security@...ian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
December 21, 2014                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firebird2.5
CVE ID         : CVE-2014-9323
Debian Bug     : 772880

Dmitry Kovalenko discovered that the Firebird database server is prone
to a denial of service vulnerability. An unauthenticated remote attacker
could send a malformed network packet to a firebird server, which would
cause the server to crash.

For the stable distribution (wheezy), this problem has been fixed in
version 2.5.2.26540.ds4-1~deb7u2.

For the upcoming stable distribution (jessie), this problem has been
fixed in version 2.5.3.26778.ds4-5.

For the unstable distribution (sid), this problem has been fixed in
version 2.5.3.26778.ds4-5.

We recommend that you upgrade your firebird2.5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=I/I/
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ