Lucene search

K
debianDebianDEBIAN:DSA-3269-2:FDE68
HistoryMay 31, 2015 - 4:55 a.m.

[SECURITY] [DSA 3269-2] postgresql-9.1 regression update

2015-05-3104:55:56
lists.debian.org
13

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.085

Percentile

94.5%


Debian Security Advisory DSA-3269-2 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
May 31, 2015 http://www.debian.org/security/faq


Package : postgresql-9.1
Debian Bug : 786874

The update for postgresql-9.1 in DSA-3269-1 introduced a regression
which can causes PostgreSQL to refuse to restart after an unexpected
shutdown or when restoring from a binary backup. Updated packages are
now available to address this regression. Please refer to the upstream
Bug FAQ for additional information:

https://wiki.postgresql.org/wiki/May_2015_Fsync_Permissions_Bug

For reference, the original advisory text follows.

Several vulnerabilities have been found in PostgreSQL-9.1, a SQL
database system.

CVE-2015-3165 (Remote crash)

SSL clients disconnecting just before the authentication timeout
expires can cause the server to crash.

CVE-2015-3166 (Information exposure)

The replacement implementation of snprintf() failed to check for
errors reported by the underlying system library calls; the main
case that might be missed is out-of-memory situations. In the worst
case this might lead to information exposure

CVE-2015-3167 (Possible side-channel key exposure)

In contrib/pgcrypto, some cases of decryption with an incorrect key
could report other error message texts. Fix by using a
one-size-fits-all message.

For the oldstable distribution (wheezy), this problem has been fixed
in version 9.1.16-0+deb7u2.

We recommend that you upgrade your postgresql-9.1 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.085

Percentile

94.5%