Improper Synchronization Affecting postgresql-devel package, versions <0:9.2.10-2.el7_1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-POSTGRESQLDEVEL-4539488
- published 26 Jul 2021
- disclosed 16 Feb 2015
How to fix?
Upgrade RHEL:7 postgresql-devel to version 0:9.2.10-2.el7_1 or higher.
This issue was patched in RHSA-2015:0750.
NVD Description
Note: Versions mentioned in the description apply only to the upstream postgresql-devel package and not the postgresql-devel package as distributed by RHEL.
See How to fix? for RHEL:7 relevant fixed versions and status.
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation.
References
- http://www.debian.org/security/2015/dsa-3155
- http://www.postgresql.org/about/news/1569/
- http://www.postgresql.org/docs/9.4/static/release-9-4-1.html
- http://www.postgresql.org/docs/current/static/release-9-0-19.html
- http://www.postgresql.org/docs/current/static/release-9-1-15.html
- http://www.postgresql.org/docs/current/static/release-9-2-10.html
- http://www.postgresql.org/docs/current/static/release-9-3-6.html
- https://access.redhat.com/security/cve/CVE-2015-0244
- https://access.redhat.com/errata/RHSA-2015:0750