{"id":"MGASA-2015-0159","summary":"Updated perl-DBD-Firebird packages fix CVE-2015-2788","details":"Updated perl-DBD-Firebird packages fix security vulnerability:\n\nStefan Roas discovered a way to cause a buffer overflow in DBD::FireBird in\ncertain error conditions, due to the use of the sprintf() function to write\nto a fixed-size memory buffer (CVE-2015-2788).\n","modified":"2026-04-16T06:25:09.723637591Z","published":"2015-04-18T08:21:36Z","upstream":["CVE-2015-2788"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0159.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15587"},{"type":"WEB","url":"https://www.debian.org/security/2015/dsa-3219"}],"affected":[{"package":{"name":"perl-DBD-Firebird","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/perl-DBD-Firebird?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.150.0-2.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0159.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}