PostgreSQL: Multiple vulnerabilities Multiple vulnerabilities have been found in PostgreSQL which may allow a remote attacker to conduct several attacks. PostgreSQL 2012-09-28 2014-01-20 406037 419727 431766 remote 9.1.5 9.0.9 8.4.13 8.3.20 8.4.17 8.4.19 9.0.13 9.0.14 9.0.15 8.4.14 8.4.15 8.4.16 9.0.16 9.0.17 9.1.5

PostgreSQL is an open source object-relational database management system.

Multiple vulnerabilities have been discovered in PostgreSQL. Please review the CVE identifiers referenced below for details.

A remote attacker could spoof SSL connections. Furthermore, a remote authenticated attacker could cause a Denial of Service, read and write arbitrary files, inject SQL commands into dump scripts, or bypass database restrictions to execute database functions.

A context-dependent attacker could more easily obtain access via authentication attempts with an initial substring of the intended password.

There is no known workaround at this time.

All PostgreSQL 9.1 server users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-server-9.1.5"

All PostgreSQL 9.0 server users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-server-9.0.9"

All PostgreSQL 8.4 server users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-server-8.4.13"

All PostgreSQL 8.3 server users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-server-8.3.20"
CVE-2012-0866 CVE-2012-0867 CVE-2012-0868 CVE-2012-2143 CVE-2012-2655 CVE-2012-3488 CVE-2012-3489 underling ackle