Bug 15587 - perl-DBD-Firebird new security issue fixed upstream in 1.19 (CVE-2015-2788)
Summary: perl-DBD-Firebird new security issue fixed upstream in 1.19 (CVE-2015-2788)
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/640168/
Whiteboard: MGA4-64-OK has_procedure MGA4-32-OK a...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-03-30 14:00 CEST by David Walser
Modified: 2015-04-18 10:22 CEST (History)
3 users (show)

See Also:
Source RPM: perl-DBD-Firebird-1.180.0-5.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-03-30 14:00:34 CEST
A CVE has been requested for a security issue fixed in DBD::Firebird 1.19:
http://openwall.com/lists/oss-security/2015/03/30/4

The security issue was buffer overflows from the use of sprintf.  Debian has patches to fix the issues found, as well as to convert sprintf usages to safer snprintf, which were accepted upstream.

Mageia 4 and Mageia 5 are affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-03-30 14:00:45 CEST

CC: (none) => mageia
Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-03-30 18:22:15 CEST
CVE-2015-2788 has been assigned:
http://openwall.com/lists/oss-security/2015/03/30/10

Summary: perl-DBD-Firebird new security issue fixed upstream in 1.19 => perl-DBD-Firebird new security issue fixed upstream in 1.19 (CVE-2015-2788)

Comment 2 Sander Lepik 2015-04-03 14:52:16 CEST
1.19 is waiting to be submitted into cauldron.

I'm not sure how to test this update. I checked that the patch was applied and the tests passed.

Updated packages in core/updates_testing:
========================
perl-DBD-Firebird-1.150.0-2.1.mga4

Source RPM: 
perl-DBD-Firebird-1.150.0-2.1.mga4.src.rpm
Comment 3 Sander Lepik 2015-04-03 22:52:14 CEST
1.19 submitted successfully. It would be nice if someone could help with the advisory.

Hardware: i586 => All
Version: Cauldron => 4
Assignee: jquelin => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => (none)

Comment 4 David Walser 2015-04-03 23:59:37 CEST
Thanks Sander!

Advisory:
========================

Updated perl-DBD-Firebird packages fix security vulnerability:

The DBD::Firebird perl module before 1.19 is vulnerable to buffer overflows in
dbdimp.c (CVE-2015-2788).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2788
http://openwall.com/lists/oss-security/2015/03/30/10
Comment 5 David Walser 2015-04-13 23:13:20 CEST
Debian has issued an advisory for this on April 11:
https://www.debian.org/security/2015/dsa-3219

Advisory:
========================

Updated perl-DBD-Firebird packages fix security vulnerability:

Stefan Roas discovered a way to cause a buffer overflow in DBD::FireBird in
certain error conditions, due to the use of the sprintf() function to write
to a fixed-size memory buffer (CVE-2015-2788).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2788
https://www.debian.org/security/2015/dsa-3219

URL: (none) => http://lwn.net/Vulnerabilities/640168/

Comment 6 Shlomi Fish 2015-04-16 23:00:30 CEST
I tested this update using the procedure at https://bugs.mageia.org/show_bug.cgi?id=14726#c6 followed by running this Perl script before and after the upgrade to the package from core/updates_testing:

<<<<
use strict;
use warnings;

use DBI;

my $dbh = DBI->connect('dbi:Firebird:db=employee' , 'SYSDBA' ,'masterkey');

my $sth = $dbh->prepare('SELECT * FROM t');

$sth->execute();

while (my $aref = $sth->fetchrow_arrayref)
{
     print "Got: @$aref\n";
}
>>>>

Everything was working fine. Tested on i586 and x86-64 VBox VMs.

CC: (none) => shlomif
Whiteboard: (none) => MGA4-64-OK has_procedure MGA4-32-OK

Comment 7 claire robinson 2015-04-17 09:26:54 CEST
Nice job Shlomi
Comment 8 claire robinson 2015-04-17 18:13:22 CEST
Validating. Advisory uploaded.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: MGA4-64-OK has_procedure MGA4-32-OK => MGA4-64-OK has_procedure MGA4-32-OK advisory
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2015-04-18 10:22:09 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0159.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.