firebird2.5: CVE-2013-2492: Request Processing Buffer Overflow Vulnerability
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
firebird2.5 (Debian) |
Fix Released
|
Unknown
|
|||
firebird2.5 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Precise |
Won't Fix
|
Undecided
|
Unassigned | ||
Quantal |
Won't Fix
|
Undecided
|
Unassigned | ||
Raring |
Won't Fix
|
Undecided
|
Unassigned | ||
Saucy |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Imported from Debian bug http://
Source: firebird2.5
Severity: grave
Tags: security
Hi
the following vulnerability was published for firebird2.5.
CVE-2013-2492[0]:
Request Processing Buffer Overflow Vulnerability
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see also [1] and [2].
[0] http://
http://
[1] http://
[2] https:/
Thank you for looking into this.
Regards,
Salvatore
information type: | Public → Public Security |
Changed in firebird2.5 (Debian): | |
importance: | Undecided → Unknown |
status: | New → Fix Released |
Changed in firebird2.5 (Ubuntu Raring): | |
status: | New → Won't Fix |
Changed in firebird2.5 (Ubuntu Quantal): | |
status: | New → Won't Fix |
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res