Debian Security Advisory
DLA-2824-1 firebird3.0 -- LTS security update
- Date Reported:
- 20 Nov 2021
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-11509.
- More information:
An authenticated remote attacker can execute arbitrary code in Firebird, a relational database based on InterBase 6.0, by executing a malformed SQL statement. The only known solution is to disable external UDF libraries from being loaded. In order to achieve this, the default configuration has changed to UdfAccess=None. This will prevent the fbudf module from being loaded, but may also break other functionality relying on modules.
For Debian 9 stretch, this problem has been fixed in version 220.127.116.11609.ds4-14+deb9u1.
We recommend that you upgrade your firebird3.0 packages.
For the detailed security status of firebird3.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firebird3.0
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS