Updated postgresql package fixes security vulnerability
Publication date: 01 Jul 2015Modification date: 09 Jul 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2015-3165 , CVE-2015-3166 , CVE-2015-3167
Description
Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence (CVE-2015-3165). The replacement implementation of snprintf() failed to check for errors reported by the underlying system library calls; the main case that might be missed is out-of-memory situations. In the worst case this might lead to information exposure (CVE-2015-3166). In contrib/pgcrypto, some cases of decryption with an incorrect key could report other error message texts, possibly leading to a side-channel key exposure (CVE-2015-3167). The postgresql9.0, postgresql9.1, postgresql9.2, and postgresql9.3 packages have been updated to versions 9.0.22, 9.1.18, 9.2.13, and 9.3.9, respectively, fixing these issues, as well as some data corruption issues. See the upstream release notes for more details.
References
- https://bugs.mageia.org/show_bug.cgi?id=16027
- http://www.postgresql.org/about/news/1587/
- http://www.postgresql.org/about/news/1590/
- http://www.postgresql.org/about/news/1592/
- https://www.debian.org/security/2015/dsa-3269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
SRPMS
4/core
- postgresql9.0-9.0.22-1.mga4
- postgresql9.1-9.1.18-1.mga4
- postgresql9.2-9.2.13-1.mga4
- postgresql9.3-9.3.9-1.mga4