http://www.mandriva.com/en/
______________________________
Package : postgresql
Date : February 12, 2015
Affected: Business Server 1.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in
postgresql:
Stephen Frost discovered that PostgreSQL incorrectly displayed
certain values in error messages. An authenticated user could gain
access to seeing certain values, contrary to expected permissions
(CVE-2014-8161).
Andres Freund, Peter Geoghegan and Noah Misch discovered that
PostgreSQL incorrectly handled buffers in to_char functions. An
authenticated attacker could possibly use this issue to cause
PostgreSQL to crash, resulting in a denial of service, or possibly
execute arbitrary code (CVE-2015-0241).
It was discovered that PostgreSQL incorrectly handled memory in the
pgcrypto extension. An authenticated attacker could possibly use this
issue to cause PostgreSQL to crash, resulting in a denial of service,
or possibly execute arbitrary code (CVE-2015-0243).
Emil Lenngren discovered that PostgreSQL incorrectly handled extended
protocol message reading. An authenticated attacker could possibly
use this issue to cause PostgreSQL to crash, resulting in a denial
of service, or possibly inject query messages (CVE-2015-0244).
This advisory provides the latest version of PostgreSQL that is not
vulnerable to these issues.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://www.postgresql.org/
http://www.ubuntu.com/usn/usn-
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
c7247e9bed1b4546e0ad8b4642a0c4
e201099de82f9e8e506a218bbce830
9c4a352c4efe8229f86d86c9dfe4ca
ea0dba2757d027a313123de9b98381
41eed84aa37c1b7f7fe04d4847c935
1b75d6c7118b01399e5967a19aa4ec
571d8991f01cc05e5e9163bf5d7e29
1d4e7e9458ae38e364550e1e81f168
c106d7f63f3f83dd797f1fcec7101b
3abb3d109b12229f89e1ae2a8f867e
22fa1beffab4ca2180f6aa3506f40d
4bd0ab5189b93ac542b2eda0bd9f3b
00c3b26e5a4567cae6d40caf499836
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą