New upstream microreleases 9.1.19, 9.3.10, 9.4.5
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| | postgresql-9.1 (Ubuntu) |
Undecided
|
Unassigned | ||
| | Precise |
Undecided
|
Unassigned | ||
| | Trusty |
Undecided
|
Unassigned | ||
| | postgresql-9.3 (Ubuntu) |
Undecided
|
Unassigned | ||
| | Trusty |
Undecided
|
Unassigned | ||
| | postgresql-9.4 (Ubuntu) |
High
|
Martin Pitt | ||
| | Vivid |
Undecided
|
Steve Beattie | ||
| | Wily |
High
|
Martin Pitt | ||
Bug Description
Today PostgreSQL published new microreleases. They fix two CVEs, and the usual bunch of bugs: http://
| Martin Pitt (pitti) wrote : | #1 |
| no longer affects: | postgresql-9.4 (Ubuntu Trusty) |
| no longer affects: | postgresql-9.4 (Ubuntu Precise) |
| Changed in postgresql-9.4 (Ubuntu Wily): | |
| assignee: | nobody → Martin Pitt (pitti) |
| importance: | Undecided → High |
| status: | New → In Progress |
| no longer affects: | postgresql-9.1 (Ubuntu Wily) |
| no longer affects: | postgresql-9.1 (Ubuntu Vivid) |
| no longer affects: | postgresql-9.3 (Ubuntu Precise) |
| no longer affects: | postgresql-9.3 (Ubuntu Wily) |
| no longer affects: | postgresql-9.3 (Ubuntu Vivid) |
| Changed in postgresql-9.3 (Ubuntu): | |
| status: | New → Invalid |
| information type: | Public → Public Security |
| Changed in postgresql-9.1 (Ubuntu): | |
| status: | New → Invalid |
| Martin Pitt (pitti) wrote : | #2 |
http://
| Changed in postgresql-9.4 (Ubuntu Vivid): | |
| status: | New → In Progress |
| Changed in postgresql-9.3 (Ubuntu Trusty): | |
| status: | New → In Progress |
| Changed in postgresql-9.1 (Ubuntu Trusty): | |
| status: | New → In Progress |
| Changed in postgresql-9.1 (Ubuntu Precise): | |
| status: | New → In Progress |
| description: | updated |
| Martin Pitt (pitti) wrote : | #3 |
https:/
| Changed in postgresql-9.4 (Ubuntu Wily): | |
| status: | In Progress → Fix Released |
| Changed in postgresql-9.4 (Ubuntu Vivid): | |
| assignee: | nobody → Ubuntu Security Team (ubuntu-security) |
| Steve Beattie (sbeattie) wrote : | #4 |
Thanks, Martin, reviewing these now.
| Changed in postgresql-9.4 (Ubuntu Vivid): | |
| assignee: | Ubuntu Security Team (ubuntu-security) → Steve Beattie (sbeattie) |
| Launchpad Janitor (janitor) wrote : | #5 |
This bug was fixed in the package postgresql-9.1 - 9.1.19-
---------------
postgresql-9.1 (9.1.19-
* New upstream bug fix release (LP: #1504132). No effective changes for
PL/Perl, the version must just be higher than the one in precise, to not
break upgrades.
-- Martin Pitt <email address hidden> Thu, 08 Oct 2015 15:52:45 +0200
| Changed in postgresql-9.1 (Ubuntu Trusty): | |
| status: | In Progress → Fix Released |
| Launchpad Janitor (janitor) wrote : | #6 |
This bug was fixed in the package postgresql-9.3 - 9.3.10-
---------------
postgresql-9.3 (9.3.10-
* New upstream security/bug fix release: (LP: #1504132)
- Guard against stack overflows in json parsing.
If an application constructs PostgreSQL json or jsonb values from
arbitrary user input, the application's users can reliably crash the
PostgreSQL server, causing momentary denial of service. (CVE-2015-5289)
- Fix contrib/pgcrypto to detect and report too-short crypt() salts
Certain invalid salt arguments crashed the server or disclosed a few
bytes of server memory. We have not ruled out the viability of attacks
that arrange for presence of confidential information in the disclosed
bytes, but they seem unlikely. (CVE-2015-5288)
- See release notes for details about other fixes.
-- Martin Pitt <email address hidden> Thu, 08 Oct 2015 15:42:16 +0200
| Changed in postgresql-9.3 (Ubuntu Trusty): | |
| status: | In Progress → Fix Released |
| Launchpad Janitor (janitor) wrote : | #7 |
This bug was fixed in the package postgresql-9.4 - 9.4.5-0ubuntu0.
---------------
postgresql-9.4 (9.4.5-
* New upstream security/bug fix release: (LP: #1504132)
- Guard against stack overflows in json parsing.
If an application constructs PostgreSQL json or jsonb values from
arbitrary user input, the application's users can reliably crash the
PostgreSQL server, causing momentary denial of service. (CVE-2015-5289)
- Fix contrib/pgcrypto to detect and report too-short crypt() salts
Certain invalid salt arguments crashed the server or disclosed a few
bytes of server memory. We have not ruled out the viability of attacks
that arrange for presence of confidential information in the disclosed
bytes, but they seem unlikely. (CVE-2015-5288)
- See release notes for details about other fixes.
-- Martin Pitt <email address hidden> Thu, 08 Oct 2015 15:36:31 +0200
| Changed in postgresql-9.4 (Ubuntu Vivid): | |
| status: | In Progress → Fix Released |
| Launchpad Janitor (janitor) wrote : | #8 |
This bug was fixed in the package postgresql-9.1 - 9.1.19-
---------------
postgresql-9.1 (9.1.19-
* New upstream security/bug fix release (LP: #1504132)
- Fix contrib/pgcrypto to detect and report too-short crypt() salts
Certain invalid salt arguments crashed the server or disclosed a few
bytes of server memory. We have not ruled out the viability of attacks
that arrange for presence of confidential information in the disclosed
bytes, but they seem unlikely. (CVE-2015-5288)
- See release notes for details about other fixes.
-- Martin Pitt <email address hidden> Thu, 08 Oct 2015 16:03:41 +0200
| Changed in postgresql-9.1 (Ubuntu Precise): | |
| status: | In Progress → Fix Released |


9.4.5-1 just landed in sid, will sync in a few hours when it got imported into LP.