Access Restriction Bypass The advisory has been revoked - it doesn't affect any version of package postgresql-9.3  (opens in a new tab)


Threat Intelligence

EPSS
0.43% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1404-POSTGRESQL93-621721
  • published10 Sept 2020
  • disclosed11 Apr 2016

Introduced: 11 Apr 2016

CVE-2016-3065  (opens in a new tab)
CWE-264  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:14.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql-9.3 package and not the postgresql-9.3 package as distributed by Ubuntu.

The (1) brin_page_type and (2) brin_metapage_info functions in the pageinspect extension in PostgreSQL before 9.5.x before 9.5.2 allows attackers to bypass intended access restrictions and consequently obtain sensitive server memory information or cause a denial of service (server crash) via a crafted bytea value in a BRIN index page.