Updated postgresql packages fix security vulnerabilities
Publication date: 13 Apr 2016Modification date: 13 Apr 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-2193 , CVE-2016-3065
Description
Updated postgresql packages fix security vulnerabilities: A vulnerability in PostgreSQL 9.3.x before 9.3.12 and 9.4.x before 9.4.7 leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles, which could happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy (CVE-2016-2193). A vulnerability was found in a way PostgreSQL 9.3.x before 9.3.12 and 9.4.x before 9.4.7 uses pageinspect functions. Certain function arguments crashed the server or disclosed a few bytes of server memory. The viability of attacks that arrange for presence of confidential information in the disclosed bytes was not ruled out. This affects only databases that have used "CREATE EXTENSION pageinspect" (CVE-2016-3065).
References
- https://bugs.mageia.org/show_bug.cgi?id=18103
- http://www.postgresql.org/docs/current/static/release-9-3-12.html
- http://www.postgresql.org/docs/current/static/release-9-4-7.html
- http://www.postgresql.org/about/news/1656/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3065
SRPMS
5/core
- postgresql9.3-9.3.12-1.mga5
- postgresql9.4-9.4.7-1.mga5