New upstream microreleases 9.1.19, 9.3.10, 9.4.5

Bug #1504132 reported by Martin Pitt
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
postgresql-9.1 (Ubuntu)
Invalid
Undecided
Unassigned
Precise
Fix Released
Undecided
Unassigned
Trusty
Fix Released
Undecided
Unassigned
postgresql-9.3 (Ubuntu)
Invalid
Undecided
Unassigned
Trusty
Fix Released
Undecided
Unassigned
postgresql-9.4 (Ubuntu)
Fix Released
High
Martin Pitt
Vivid
Fix Released
Undecided
Steve Beattie
Wily
Fix Released
High
Martin Pitt

Bug Description

Today PostgreSQL published new microreleases. They fix two CVEs, and the usual bunch of bugs: http://www.postgresql.org/about/news/1615/

Revision history for this message
Martin Pitt (pitti) wrote :

9.4.5-1 just landed in sid, will sync in a few hours when it got imported into LP.

no longer affects: postgresql-9.4 (Ubuntu Trusty)
no longer affects: postgresql-9.4 (Ubuntu Precise)
Changed in postgresql-9.4 (Ubuntu Wily):
assignee: nobody → Martin Pitt (pitti)
importance: Undecided → High
status: New → In Progress
no longer affects: postgresql-9.1 (Ubuntu Wily)
no longer affects: postgresql-9.1 (Ubuntu Vivid)
no longer affects: postgresql-9.3 (Ubuntu Precise)
no longer affects: postgresql-9.3 (Ubuntu Wily)
no longer affects: postgresql-9.3 (Ubuntu Vivid)
Changed in postgresql-9.3 (Ubuntu):
status: New → Invalid
information type: Public → Public Security
Martin Pitt (pitti)
Changed in postgresql-9.1 (Ubuntu):
status: New → Invalid
Revision history for this message
Martin Pitt (pitti) wrote :

http://people.canonical.com/~pitti/tmp/psql/ now has packages for vivid, trusty, and precise. They all pass the upstream tests, and vivid and trusty also pass their integration test suite (via autopkgtest). The precise packages fail their autopkgtest as usual, same errors as in http://autopkgtest.ubuntu.com/packages/p/postgresql-9.1/precise/amd64/ thus no regression.

Changed in postgresql-9.4 (Ubuntu Vivid):
status: New → In Progress
Changed in postgresql-9.3 (Ubuntu Trusty):
status: New → In Progress
Changed in postgresql-9.1 (Ubuntu Trusty):
status: New → In Progress
Changed in postgresql-9.1 (Ubuntu Precise):
status: New → In Progress
Martin Pitt (pitti)
description: updated
Revision history for this message
Martin Pitt (pitti) wrote :
Changed in postgresql-9.4 (Ubuntu Wily):
status: In Progress → Fix Released
Changed in postgresql-9.4 (Ubuntu Vivid):
assignee: nobody → Ubuntu Security Team (ubuntu-security)
Revision history for this message
Steve Beattie (sbeattie) wrote :

Thanks, Martin, reviewing these now.

Changed in postgresql-9.4 (Ubuntu Vivid):
assignee: Ubuntu Security Team (ubuntu-security) → Steve Beattie (sbeattie)
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package postgresql-9.1 - 9.1.19-0ubuntu0.14.04

---------------
postgresql-9.1 (9.1.19-0ubuntu0.14.04) trusty-security; urgency=medium

  * New upstream bug fix release (LP: #1504132). No effective changes for
    PL/Perl, the version must just be higher than the one in precise, to not
    break upgrades.

 -- Martin Pitt <email address hidden> Thu, 08 Oct 2015 15:52:45 +0200

Changed in postgresql-9.1 (Ubuntu Trusty):
status: In Progress → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package postgresql-9.3 - 9.3.10-0ubuntu0.14.04

---------------
postgresql-9.3 (9.3.10-0ubuntu0.14.04) trusty-security; urgency=medium

  * New upstream security/bug fix release: (LP: #1504132)
    - Guard against stack overflows in json parsing.
      If an application constructs PostgreSQL json or jsonb values from
      arbitrary user input, the application's users can reliably crash the
      PostgreSQL server, causing momentary denial of service. (CVE-2015-5289)

    - Fix contrib/pgcrypto to detect and report too-short crypt() salts
      Certain invalid salt arguments crashed the server or disclosed a few
      bytes of server memory. We have not ruled out the viability of attacks
      that arrange for presence of confidential information in the disclosed
      bytes, but they seem unlikely. (CVE-2015-5288)

    - See release notes for details about other fixes.

 -- Martin Pitt <email address hidden> Thu, 08 Oct 2015 15:42:16 +0200

Changed in postgresql-9.3 (Ubuntu Trusty):
status: In Progress → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package postgresql-9.4 - 9.4.5-0ubuntu0.15.04

---------------
postgresql-9.4 (9.4.5-0ubuntu0.15.04) vivid-security; urgency=medium

  * New upstream security/bug fix release: (LP: #1504132)
    - Guard against stack overflows in json parsing.
      If an application constructs PostgreSQL json or jsonb values from
      arbitrary user input, the application's users can reliably crash the
      PostgreSQL server, causing momentary denial of service. (CVE-2015-5289)

    - Fix contrib/pgcrypto to detect and report too-short crypt() salts
      Certain invalid salt arguments crashed the server or disclosed a few
      bytes of server memory. We have not ruled out the viability of attacks
      that arrange for presence of confidential information in the disclosed
      bytes, but they seem unlikely. (CVE-2015-5288)

    - See release notes for details about other fixes.

 -- Martin Pitt <email address hidden> Thu, 08 Oct 2015 15:36:31 +0200

Changed in postgresql-9.4 (Ubuntu Vivid):
status: In Progress → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package postgresql-9.1 - 9.1.19-0ubuntu0.12.04

---------------
postgresql-9.1 (9.1.19-0ubuntu0.12.04) precise-security; urgency=medium

  * New upstream security/bug fix release (LP: #1504132)
    - Fix contrib/pgcrypto to detect and report too-short crypt() salts
      Certain invalid salt arguments crashed the server or disclosed a few
      bytes of server memory. We have not ruled out the viability of attacks
      that arrange for presence of confidential information in the disclosed
      bytes, but they seem unlikely. (CVE-2015-5288)
    - See release notes for details about other fixes.

 -- Martin Pitt <email address hidden> Thu, 08 Oct 2015 16:03:41 +0200

Changed in postgresql-9.1 (Ubuntu Precise):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.