Operating System:

[Debian]

Published:

20 October 2015

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2634
                      postgresql-9.4 security update
                              20 October 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           postgresql-9.4
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
                   Denial of Service      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-5289 CVE-2015-5288 

Reference:         ASB-2015.0098

Original Bulletin: 
   http://www.debian.org/security/2015/dsa-3374

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3374-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
October 19, 2015                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : postgresql-9.4
CVE ID         : CVE-2015-5288 CVE-2015-5289

Several vulnerabilities have been found in PostgreSQL-9.4, a SQL
database system.

CVE-2015-5288

    Josh Kupershmidt discovered a vulnerability in the crypt() function
    in the pgCrypto extension. Certain invalid salt arguments can cause
    the server to crash or to disclose a few bytes of server memory.

CVE-2015-5289

    Oskari Saarenmaa discovered that json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.

For the stable distribution (jessie), these problems have been fixed in
version 9.4.5-0+deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 9.4.5-1.

For the unstable distribution (sid), these problems have been fixed in
version 9.4.5-1.

We recommend that you upgrade your postgresql-9.4 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJWJQ6uAAoJEAVMuPMTQ89EgeYP/2ddc78SvGZvp0bvW8k9QReb
lPZuARqC1lmtLY51rDEM43aFDWwM01TpnoRvYyVXcphsalK16Sz0Ho7m20gqGrSj
RGNwG2zSQFcyU1OWINdEgmV10x/ufSrbyHQyf4m5hS9luMRlIGbGXV/DbSqvDF90
kNZ0NXz/g8iVOAf+9h+i6R5X6tPTAWgrj+X6IBngMi0jntvA30kAknUc73cnfrmG
YzxblZp5eMyf56EbXecbUfMz1751wxNxbp97HuQLv29KJ/FtYr8fwC1fJqmKje9S
ngqwrJw0RQphviZ2+QxaKk+7f+VuJdfRUqPKHUau62Uxk096rVRVD1p+wAGkLW7o
PoDqx3DrF05QnoqlxyIjAJ2Lkt9CW9RyGTDwxAzdq2VQ9jnxSoKmjGkVLMSf1T+t
Ljo3z3HSi+NYQJBwegD+Uy66dKwJ8au4qL+XkGpT9dnw40iryM9Li01w9H9tJYOE
Jea+ppT53JUWjA1EEz64qVEjlbFmp/sp4J1ggXTpp9pX06i88DJZ+9ff2PU/JLZa
Br6WnK6RgCbaIIAwjUBCb1qxUNFiJBfeD1fymhcEhudvd3tKRQHC0NPouNHw3VwE
s7sRCaNnS4s/wuYpJr+nxu3HR3CQgnPVTibISg6GLNBEBTWQGfbDhdUPTyAO2yZN
y/szRjAt/4yVhJiIZd+X
=sz5D
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=2f1L
-----END PGP SIGNATURE-----