Ubuntu Security Notice 2772-1 - Josh Kupershmidt discovered the pgCrypto extension could expose several bytes of server memory if the crypt() function was provided a too-short salt. An attacker could use this flaw to read private data. Oskari Saarenmaa discovered that the json and jsonb handlers could exhaust available stack space. An attacker could use this flaw to perform a denial of service attack. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. Various other issues were also addressed.
7b71a60e0ccd343b09519a9460d503e41574b5c1bcd194439de80f36faf89604
==========================================================================
Ubuntu Security Notice USN-2772-1
October 16, 2015
postgresql-9.1, postgresql-9.3, postgresql-9.4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
PostgreSQL could be made to crash or expose private information if it
handled specially crafted data.
Software Description:
- postgresql-9.4: Object-relational SQL database
- postgresql-9.3: Object-relational SQL database
- postgresql-9.1: Object-relational SQL database
Details:
Josh Kupershmidt discovered the pgCrypto extension could expose
several bytes of server memory if the crypt() function was provided a
too-short salt. An attacker could use this flaw to read private data.
(CVE-2015-5288)
Oskari Saarenmaa discovered that the json and jsonb handlers could exhaust
available stack space. An attacker could use this flaw to perform a denial
of service attack. This issue only affected Ubuntu 14.04 LTS and Ubuntu
15.04. (CVE-2015-5289)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
postgresql-9.4 9.4.5-0ubuntu0.15.04
Ubuntu 14.04 LTS:
postgresql-9.3 9.3.10-0ubuntu0.14.04
Ubuntu 12.04 LTS:
postgresql-9.1 9.1.19-0ubuntu0.12.04
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2772-1
CVE-2015-5288, CVE-2015-5289
Package Information:
https://launchpad.net/ubuntu/+source/postgresql-9.4/9.4.5-0ubuntu0.15.04
https://launchpad.net/ubuntu/+source/postgresql-9.3/9.3.10-0ubuntu0.14.04
https://launchpad.net/ubuntu/+source/postgresql-9.1/9.1.19-0ubuntu0.12.04