-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1216
                      postgresql-9.4 security update
                                15 May 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           postgresql-9.4
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Privileged Data         -- Existing Account      
                   Provide Misleading Information -- Remote/Unauthenticated
                   Access Confidential Data       -- Remote/Unauthenticated
                   Reduced Security               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-7486 CVE-2017-7485 CVE-2017-7484

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3851

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running postgresql-9.4 check for an updated version of the software
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3851-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
May 12, 2017                          https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : postgresql-9.4
CVE ID         : CVE-2017-7484 CVE-2017-7485 CVE-2017-7486

Several vulnerabilities have been found in the PostgreSQL database
system:

CVE-2017-7484

    Robert Haas discovered that some selectivity estimators did not
    validate user privileges which could result in information
    disclosure.

CVE-2017-7485

    Daniel Gustafsson discovered that the PGREQUIRESSL environment
    variable did no longer enforce a TLS connection.

CVE-2017-7486

    Andrew Wheelwright discovered that user mappings were insufficiently
    restricted.

For the stable distribution (jessie), these problems have been fixed in
version 9.4.12-0+deb8u1.

We recommend that you upgrade your postgresql-9.4 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=E7t9
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=441d
-----END PGP SIGNATURE-----