ALT-PU-2015-1840-2
Package postgresql9.4 updated to version 9.4.5-alt1 for branch sisyphus in task 150905.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-11958
Уязвимости системы управления базами данных PostgreSQL, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11959
Уязвимость системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании или прочитать произвольные участки памяти сервера
Modified: 2025-04-12
CVE-2015-5288
The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.debian.org/security/2016/dsa-3475
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
- http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77049
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.debian.org/security/2016/dsa-3475
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
- http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77049
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
Modified: 2025-04-12
CVE-2015-5289
Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
- http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77048
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
- http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77048
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
Closed bugs
please, add /usr/include/postgresql -> pgsql symlink
