|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for postgresql RHSA-2015:1194-01|
|Summary:||The remote host is missing an update for the 'postgresql'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'postgresql'
package(s) announced via the referenced advisory.
PostgreSQL is an advanced object-relational database management system
A double-free flaw was found in the connection handling. An unauthenticated
attacker could exploit this flaw to crash the PostgreSQL back end by
disconnecting at approximately the same time as the authentication time out
is triggered. (CVE-2015-3165)
It was discovered that PostgreSQL did not properly check the return values
of certain standard library functions. If the system is in a state that
would cause the standard library functions to fail, for example memory
exhaustion, an authenticated user could exploit this flaw to disclose
partial memory contents or cause the GSSAPI authentication to use an
incorrect keytab file. (CVE-2015-3166)
It was discovered that the pgcrypto module could return different error
messages when decrypting certain data with an incorrect key. This can help
an authenticated user to launch a possible cryptographic attack, although
no suitable attack is currently known. (CVE-2015-3167)
Red Hat would like to thank the PostgreSQL project for reporting these
issues. Upstream acknowledges Benkocs Norbert Attila as the original
reporter of CVE-2015-3165 and Noah Misch as the original reporter of
CVE-2015-3166 and CVE-2015-3167.
All PostgreSQL users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. If the
postgresql service is running, it will be automatically restarted after
installing this update.
postgresql on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Server (v. 7),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2015-3165|
BugTraq ID: 74787
Debian Security Information: DSA-3269 (Google Search)
Debian Security Information: DSA-3270 (Google Search)
RedHat Security Advisories: RHSA-2015:1194
RedHat Security Advisories: RHSA-2015:1195
RedHat Security Advisories: RHSA-2015:1196
Common Vulnerability Exposure (CVE) ID: CVE-2015-3166
Common Vulnerability Exposure (CVE) ID: CVE-2015-3167
|Copyright||Copyright (C) 2015 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.