<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for firebird is now available for openEuler-24.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2015</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-04-25</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-04-25</InitialReleaseDate>
		<CurrentReleaseDate>2026-04-25</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-04-25</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">firebird security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for firebird is now available for openEuler-24.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Firebird is a relational database offering many ANSI SQL standard features that runs on Linux, Windows, MacOS and a variety of Unix platforms. Firebird offers excellent concurrency, high performance, and powerful language support for stored procedures and triggers. It has been used in production systems, under a variety of names, since 1981.

Security Fix(es):

Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This issue is fixed by upgrading to the FB4 client or higher.(CVE-2025-65104)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class&apos;s grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who knows only the server&apos;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-27890)

Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-28212)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the ClumpletReader::getClumpletSize() function can overflow the totalLength value when parsing a Wide type clumplet, causing an infinite loop. An authenticated user with INSERT privileges on any table can exploit this via a crafted Batch Parameter Block to cause a denial of service against the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-28214)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference and server crash. An unauthenticated attacker who knows only the server&apos;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-28224)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the server, potentially causing a crash or other security impact. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-33337)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector() function does not handle the isc_arg_cstring type when decoding an op_response packet, causing a server crash when one is encountered in the status vector. An unauthenticated attacker can exploit this by sending a crafted op_response packet to the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-34232)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the sdl_desc() function does not validate the length of a decoded SDL descriptor from a slice packet. A zero-length descriptor is later used to calculate the number of slice items, causing a division by zero. An unauthenticated attacker can exploit this by sending a crafted slice packet to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-35215)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library&apos;s initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server&apos;s OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.(CVE-2026-40342)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for firebird is now available for openEuler-24.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">firebird</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-65104</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-27890</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-28212</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-28214</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-28224</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-33337</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-34232</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-35215</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40342</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-65104</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-27890</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-28212</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-28214</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-28224</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-33337</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-34232</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-35215</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40342</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="firebird-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="firebird-debuginfo-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-debuginfo-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="firebird-debugsource-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-debugsource-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="firebird-devel-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-devel-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="firebird-utils-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-utils-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libfbclient2-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libfbclient2-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libfbclient2-devel-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libfbclient2-devel-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libib-util-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libib-util-4.0.7.3271-1.oe2403sp1.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="firebird-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-4.0.7.3271-1.oe2403sp1.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="firebird-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="firebird-debuginfo-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-debuginfo-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="firebird-debugsource-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-debugsource-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="firebird-devel-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-devel-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="firebird-utils-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-utils-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libfbclient2-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libfbclient2-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libfbclient2-devel-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libfbclient2-devel-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libib-util-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">libib-util-4.0.7.3271-1.oe2403sp1.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="firebird-help-4.0.7.3271-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">firebird-help-4.0.7.3271-1.oe2403sp1.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This issue is fixed by upgrading to the FB4 client or higher.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2025-65104</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.9</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class&apos;s grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who knows only the server&apos;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-27890</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.2</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-28212</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the ClumpletReader::getClumpletSize() function can overflow the totalLength value when parsing a Wide type clumplet, causing an infinite loop. An authenticated user with INSERT privileges on any table can exploit this via a crafted Batch Parameter Block to cause a denial of service against the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-28214</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.0</BaseScore>
				<Vector>AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference and server crash. An unauthenticated attacker who knows only the server&apos;s IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-28224</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.2</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the server, potentially causing a crash or other security impact. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-33337</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector() function does not handle the isc_arg_cstring type when decoding an op_response packet, causing a server crash when one is encountered in the status vector. An unauthenticated attacker can exploit this by sending a crafted op_response packet to the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-34232</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the sdl_desc() function does not validate the length of a decoded SDL descriptor from a slice packet. A zero-length descriptor is later used to calculate the number of slice items, causing a division by zero. An unauthenticated attacker can exploit this by sending a crafted slice packet to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-35215</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library&apos;s initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server&apos;s OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40342</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.9</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>firebird security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2015</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>