Scientific Linux Security Update : postgresql and postgresql84 on SL5.x, SL6.x i386/x86_64

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

An array index error, leading to a heap-based out-of-bounds buffer
read flaw, was found in the way PostgreSQL performed certain error
processing using enumeration types. An unprivileged database user
could issue a specially crafted SQL query that, when processed by the
server component of the PostgreSQL service, would lead to a denial of
service (daemon crash) or disclosure of certain portions of server
memory. (CVE-2013-0255)

A flaw was found in the way the pgcrypto contrib module of PostgreSQL
(re)initialized its internal random number generator. This could lead
to random numbers with less bits of entropy being used by certain
pgcrypto functions, possibly allowing an attacker to conduct other
attacks. (CVE-2013-1900)

These updated packages upgrade PostgreSQL to version 8.4.18, which
fixes these issues as well as several non-security issues. Refer to
the PostgreSQL Release Notes for a full list of changes :

After installing this update, it is advisable to rebuild, using the
REINDEX command, Generalized Search Tree (GiST) indexes that meet one
or more of the following conditions :

- GiST indexes on box, polygon, circle, or point columns

- GiST indexes for variable-width data types, that is
text, bytea, bit, and numeric

- GiST multi-column indexes

If the postgresql service is running, it will be automatically
restarted after installing this update.

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 8.5

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 70705 ()

Bugtraq ID:

CVE ID: CVE-2013-0255

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now