![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.2.2015.329 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-329-1) |
Summary: | The remote host is missing an update for the Debian 'postgresql-8.4' package(s) announced via the DLA-329-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'postgresql-8.4' package(s) announced via the DLA-329-1 advisory. Vulnerability Insight: Several bugs were discovered in PostgreSQL, a relational database server system. The 8.4 branch is EOLed upstream, but still present in Debian squeeze. This new LTS minor version contains the fixes that were applied upstream to the 9.0.22 version, backported to 8.4.22 which was the last version officially released by the PostgreSQL developers. This LTS effort for squeeze-lts is a community project sponsored by credativ GmbH. Migration to Version 8.4.22lts5 A dump/restore is not required for those running 8.4.X. However, if you are upgrading from a version earlier than 8.4.22, see the relevant release notes. Security Fixes Fix contrib/pgcrypto to detect and report too-short crypt salts (Josh Kupershmidt) Certain invalid salt arguments crashed the server or disclosed a few bytes of server memory. We have not ruled out the viability of attacks that arrange for presence of confidential information in the disclosed bytes, but they seem unlikely. (CVE-2015-5288) Affected Software/OS: 'postgresql-8.4' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 6.4 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5288 BugTraq ID: 77049 http://www.securityfocus.com/bid/77049 Debian Security Information: DSA-3374 (Google Search) http://www.debian.org/security/2015/dsa-3374 Debian Security Information: DSA-3475 (Google Search) http://www.debian.org/security/2016/dsa-3475 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html https://security.gentoo.org/glsa/201701-33 http://www.securitytracker.com/id/1033775 SuSE Security Announcement: SUSE-SU-2016:0677 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html SuSE Security Announcement: openSUSE-SU-2015:1907 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html SuSE Security Announcement: openSUSE-SU-2015:1919 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html http://www.ubuntu.com/usn/USN-2772-1 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |