Advisories ยป MGASA-2016-0289

Updated postgresql packages fix security vulnerability

Publication date: 31 Aug 2016
Modification date: 31 Aug 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-5423 , CVE-2016-5424

Description

It was discovered that certain SQL statements containing CASE/WHEN
commands could crash the PostgreSQL server, or disclose a few bytes of
server memory, potentially leading to arbitrary code execution
(CVE-2016-5423).

It was found that PostgreSQL client programs mishandle database and role
names containing newlines, carriage returns, double quotes, or
backslashes. By crafting such an object name, roles with the CREATEDB or
CREATEROLE option could escalate their privileges to root when a root user
next executes maintenance with a vulnerable program. Vulnerable programs
include pg_dumpall, pg_upgrade, vacuumdb, reindexdb, and clusterdb
(CVE-2016-5424).
                

References

SRPMS

5/core