Wind River Support Network


LIN6-9977 : Security Advisory - postgresql - CVE-2015-3166

Created: Jun 9, 2015    Updated: Dec 3, 2018
Resolved Date: Jul 8, 2015
Previous ID: LIN4-32710
Found In Version:
Fix Version:
Severity: Standard
Applicable for: Wind River Linux 6
Component/s: Userspace


The PostgreSQL project reports the following issue:

The server regularly ignores the return value of certain standard library functions, such as sprintf() and putenv(), which can fail under memory exhaustion. This could, in principle, have a variety of security-relevant effects. For example, an unnoticed sprintf() error could permit disclosure of prior buffer contents. A particular putenv() failure could cause GSSAPI authentication to consult the wrong keytab file. Reducing such exploits to practice is expected to be impossible in most configurations, given the requirement for such an intricate coincidence of system state.

This flaw is fixed in upstream versions 9.4.2, 9.3.7, 9.2.11, 9.1.16, and 9.0.20 of PostgreSQL.


Red Hat would like to thank the PostgreSQL project for reporting this issue. Upstream acknowledges Noah Misch as the original reporter.

Other Downloads

Live chat