Moderate CentOS postgresql Security Update


postgresql-9.2.14-1.el7_1.i686.rpm, postgresql-9.2.14-1.el7_1.src.rpm, postgresql-9.2.14-1.el7_1.x86_64.rpm, postgresql-contrib-9.2.14-1.el7_1.x86_64.rpm, postgresql-devel-9.2.14-1.el7_1.i686.rpm, postgresql-devel-9.2.14-1.el7_1.x86_64.rpm, postgresql-docs-9.2.14-1.el7_1.x86_64.rpm, postgresql-libs-9.2.14-1.el7_1.i686.rpm, postgresql-libs-9.2.14-1.el7_1.x86_64.rpm, postgresql-plperl-9.2.14-1.el7_1.x86_64.rpm, postgresql-plpython-9.2.14-1.el7_1.x86_64.rpm, postgresql-pltcl-9.2.14-1.el7_1.x86_64.rpm, postgresql-server-9.2.14-1.el7_1.x86_64.rpm, postgresql-test-9.2.14-1.el7_1.x86_64.rpm, postgresql-upgrade-9.2.14-1.el7_1.x86_64.rpm,
2018-01-18 11:11
2017-07-27 19:10
2017-04-01 19:09
2017-01-05 20:13


Updated postgresql packages that fix two security issues are now available
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

PostgreSQL is an advanced object-relational database management system

A memory leak error was discovered in the crypt() function of the pgCrypto
extension. An authenticated attacker could possibly use this flaw to
disclose a limited amount of the server memory. (CVE-2015-5288)

A stack overflow flaw was discovered in the way the PostgreSQL core server
processed certain JSON or JSONB input. An authenticated attacker could
possibly use this flaw to crash the server backend by sending specially
crafted JSON or JSONB input. (CVE-2015-5289)

Please note that SSL renegotiation is now disabled by default. For more
information, please refer to PostgreSQL's 2015-10-08 Security Update
Release notes, linked to in the References section.

All PostgreSQL users are advised to upgrade to these updated packages,
which correct these issues. If the postgresql service is running, it will
be automatically restarted after installing this update.
Please see

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
7 postgresql postgresql-9.2.14-1.el7_1.i686.rpm
postgresql postgresql-9.2.14-1.el7_1.src.rpm
postgresql postgresql-9.2.14-1.el7_1.x86_64.rpm
postgresql-contrib postgresql-contrib-9.2.14-1.el7_1.x86_64.rpm
postgresql-devel postgresql-devel-9.2.14-1.el7_1.i686.rpm
postgresql-devel postgresql-devel-9.2.14-1.el7_1.x86_64.rpm
postgresql-docs postgresql-docs-9.2.14-1.el7_1.x86_64.rpm
postgresql-libs postgresql-libs-9.2.14-1.el7_1.i686.rpm
postgresql-libs postgresql-libs-9.2.14-1.el7_1.x86_64.rpm
postgresql-plperl postgresql-plperl-9.2.14-1.el7_1.x86_64.rpm
postgresql-plpython postgresql-plpython-9.2.14-1.el7_1.x86_64.rpm
postgresql-pltcl postgresql-pltcl-9.2.14-1.el7_1.x86_64.rpm
postgresql-server postgresql-server-9.2.14-1.el7_1.x86_64.rpm
postgresql-test postgresql-test-9.2.14-1.el7_1.x86_64.rpm
postgresql-upgrade postgresql-upgrade-9.2.14-1.el7_1.x86_64.rpm