Updated postgresql packages fix security vulnerabilities
Publication date: 17 Feb 2015Modification date: 17 Feb 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2015-0241 , CVE-2015-0242 , CVE-2015-0243 , CVE-2015-0244 , CVE-2014-8161
Description
Updated postgresql packages fix security vulnerabilities:
A user with limited clearance on a table might have access to information in
columns without SELECT rights on through server error messages
(CVE-2014-8161).
The function to_char() might read/write past the end of a buffer. This might
crash the server when a formatting template is processed (CVE-2015-0241).
The pgcrypto module is vulnerable to stack buffer overrun that might crash
the server (CVE-2015-0243).
Emil Lenngren reported that an attacker can inject SQL commands when the
synchronization between client and server is lost (CVE-2015-0244).
This update provides PostgreSQL versions 9.3.6, 9.2.10, 9.1.15, and
9.0.19 that fix these issues, as well as several others.
References
- https://bugs.mageia.org/show_bug.cgi?id=15217
- http://www.postgresql.org/about/news/1569/
- https://www.debian.org/security/2015/dsa-3155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
SRPMS
4/core
- postgresql9.0-9.0.19-1.mga4
- postgresql9.1-9.1.15-1.mga4
- postgresql9.2-9.2.10-1.mga4
- postgresql9.3-9.3.6-1.mga4