You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa postgresql

Sigurnosni nedostaci programskog paketa postgresql

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3646-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 11, 2016 https://www.debian.org/security/faq
– ————————————————————————-

Package : postgresql-9.4
CVE ID : CVE-2016-5423 CVE-2016-5424

Several vulnerabilities have been found in PostgreSQL-9.4, a SQL
database system.

CVE-2016-5423

Karthikeyan Jambu Rajaraman discovered that nested CASE-WHEN
expressions are not properly evaluated, potentially leading to a
crash or allowing to disclose portions of server memory.

CVE-2016-5424

Nathan Bossart discovered that special characters in database and
role names are not properly handled, potentially leading to the
execution of commands with superuser privileges, when a superuser
executes pg_dumpall or other routine maintenance operations.

For the stable distribution (jessie), these problems have been fixed in
version 9.4.9-0+deb8u1.

We recommend that you upgrade your postgresql-9.4 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=rNEC
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-08-0095-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Nadogradnja za java-1_7_0-openjdk i java-1_8_0-openjdk

Izdana je nadogradnja koja otklanja ranjivosti u radu programskih paketa java-1_7_0-openjdk i java-1_8_0-openjdk za openSUSE. Ranjivosti su uzrokovane nedefiniranim greškama...

Close