DSA-3269-1 postgresql-9.1 -- security update

Related Vulnerabilities: CVE-2015-3165   CVE-2015-3166   CVE-2015-3167  

Several vulnerabilities have been found in PostgreSQL-9.1, a SQL database system. CVE-2015-3165 (Remote crash) SSL clients disconnecting just before the authentication timeout expires can cause the server to crash. CVE-2015-3166 (Information exposure) The replacement implementation of snprintf() failed to check for errors reported by the underlying system library calls; the main case that might be missed is out-of-memory situations. In the worst case this might lead to information exposure. CVE-2015-3167 (Possible side-channel key exposure) In contrib/pgcrypto, some cases of decryption with an incorrect key could report other error message texts. Fix by using a one-size-fits-all message. For the oldstable distribution (wheezy), these problems have been fixed in version 9.1.16-0+deb7u1. For the stable distribution (jessie), these problems have been fixed in version 9.1.16-0+deb8u1. (Jessie contains a reduced postgresql-9.1 package; only CVE-2015-3166 is fixed in the produced binary package postgresql-plperl-9.1. We recommend to upgrade to postgresql-9.4 to get the full set of fixes. See the Jessie release notes for details.) The testing distribution (stretch) and the unstable distribution (sid) do not contain the postgresql-9.1 package. We recommend that you upgrade your postgresql-9.1 packages.

Debian Security Advisory

DSA-3269-1 postgresql-9.1 -- security update

Date Reported:
22 May 2015
Affected Packages:
postgresql-9.1
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2015-3165, CVE-2015-3166, CVE-2015-3167.
More information:

Several vulnerabilities have been found in PostgreSQL-9.1, a SQL database system.

  • CVE-2015-3165 (Remote crash)

    SSL clients disconnecting just before the authentication timeout expires can cause the server to crash.

  • CVE-2015-3166 (Information exposure)

    The replacement implementation of snprintf() failed to check for errors reported by the underlying system library calls; the main case that might be missed is out-of-memory situations. In the worst case this might lead to information exposure.

  • CVE-2015-3167 (Possible side-channel key exposure)

    In contrib/pgcrypto, some cases of decryption with an incorrect key could report other error message texts. Fix by using a one-size-fits-all message.

For the oldstable distribution (wheezy), these problems have been fixed in version 9.1.16-0+deb7u1.

For the stable distribution (jessie), these problems have been fixed in version 9.1.16-0+deb8u1. (Jessie contains a reduced postgresql-9.1 package; only CVE-2015-3166 is fixed in the produced binary package postgresql-plperl-9.1. We recommend to upgrade to postgresql-9.4 to get the full set of fixes. See the Jessie release notes for details.)

The testing distribution (stretch) and the unstable distribution (sid) do not contain the postgresql-9.1 package.

We recommend that you upgrade your postgresql-9.1 packages.