Mageia alert MGASA-2019-0204 (postgresql11)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2019-0204: Updated postgresql11 packages fix security vulnerabilities | |
Date: | Wed, 10 Jul 2019 12:45:16 +0200 | |
Message-ID: | <20190710104516.15EFC9F7CD@duvel.mageia.org> |
MGASA-2019-0204 - Updated postgresql11 packages fix security vulnerabilities Publication date: 10 Jul 2019 URL: https://advisories.mageia.org/MGASA-2019-0204.html Type: security Affected Mageia releases: 7 CVE: CVE-2019-10164 Description: An authenticated user could create a stack-based buffer overflow by changing their own password to a purpose-crafted value. In addition to the ability to crash the PostgreSQL server, this could be further exploited to execute arbitrary code as the PostgreSQL operating system account. Additionally, a rogue server could send a specifically crafted message during the SCRAM authentication process and cause a libpq-enabled client to either crash or execute arbitrary code as the client's operating system account. (CVE-2019-10164) More than 25 other bugs have been fixed too, see referenced release notes. References: - https://bugs.mageia.org/show_bug.cgi?id=24996 - https://www.postgresql.org/about/news/1949/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... SRPMS: - 7/core/postgresql11-11.4-1.mga7