SCIENTIFIC-LINUX-ERRATA Archives

March 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 4 Mar 2014 21:27:48 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (84 lines)
Synopsis:          Important: postgresql security update
Advisory ID:       SLSA-2014:0249-1
Issue Date:        2014-03-04
CVE Numbers:       CVE-2014-0060
                   CVE-2014-0061
                   CVE-2014-0062
                   CVE-2014-0063
                   CVE-2014-0064
                   CVE-2014-0065
                   CVE-2014-0066
--

Multiple stack-based buffer overflow flaws were found in the date/time
implementation of PostgreSQL. An authenticated database user could provide
a specially crafted date/time value that, when processed, could cause
PostgreSQL to crash or, potentially, execute arbitrary code with the
permissions of the user running PostgreSQL. (CVE-2014-0063)

Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in various type input functions in PostgreSQL. An authenticated
database user could possibly use these flaws to crash PostgreSQL or,
potentially, execute arbitrary code with the permissions of the user
running PostgreSQL. (CVE-2014-0064)

Multiple potential buffer overflow flaws were found in PostgreSQL. An
authenticated database user could possibly use these flaws to crash
PostgreSQL or, potentially, execute arbitrary code with the permissions of
the user running PostgreSQL. (CVE-2014-0065)

It was found that granting an SQL role to a database user in a PostgreSQL
database without specifying the "ADMIN" option allowed the grantee to
remove other users from their granted role. An authenticated database user
could use this flaw to remove a user from an SQL role which they were
granted access to. (CVE-2014-0060)

A flaw was found in the validator functions provided by PostgreSQL's
procedural languages (PLs). An authenticated database user could possibly
use this flaw to escalate their privileges. (CVE-2014-0061)

A race condition was found in the way the CREATE INDEX command performed
multiple independent lookups of a table that had to be indexed. An
authenticated database user could possibly use this flaw to escalate their
privileges. (CVE-2014-0062)

It was found that the chkpass extension of PostgreSQL did not check the
return value of the crypt() function. An authenticated database user could
possibly use this flaw to crash PostgreSQL via a null pointer dereference.
(CVE-2014-0066)

If the postgresql service is running, it will be automatically restarted
after installing this update.
--

SL5
  x86_64
    postgresql-8.1.23-10.el5_10.x86_64.rpm
    postgresql-contrib-8.1.23-10.el5_10.x86_64.rpm
    postgresql-debuginfo-8.1.23-10.el5_10.i386.rpm
    postgresql-debuginfo-8.1.23-10.el5_10.x86_64.rpm
    postgresql-docs-8.1.23-10.el5_10.x86_64.rpm
    postgresql-libs-8.1.23-10.el5_10.i386.rpm
    postgresql-libs-8.1.23-10.el5_10.x86_64.rpm
    postgresql-python-8.1.23-10.el5_10.x86_64.rpm
    postgresql-tcl-8.1.23-10.el5_10.x86_64.rpm
    postgresql-devel-8.1.23-10.el5_10.i386.rpm
    postgresql-devel-8.1.23-10.el5_10.x86_64.rpm
    postgresql-pl-8.1.23-10.el5_10.x86_64.rpm
    postgresql-server-8.1.23-10.el5_10.x86_64.rpm
    postgresql-test-8.1.23-10.el5_10.x86_64.rpm
  i386
    postgresql-8.1.23-10.el5_10.i386.rpm
    postgresql-contrib-8.1.23-10.el5_10.i386.rpm
    postgresql-debuginfo-8.1.23-10.el5_10.i386.rpm
    postgresql-docs-8.1.23-10.el5_10.i386.rpm
    postgresql-libs-8.1.23-10.el5_10.i386.rpm
    postgresql-python-8.1.23-10.el5_10.i386.rpm
    postgresql-tcl-8.1.23-10.el5_10.i386.rpm
    postgresql-devel-8.1.23-10.el5_10.i386.rpm
    postgresql-pl-8.1.23-10.el5_10.i386.rpm
    postgresql-server-8.1.23-10.el5_10.i386.rpm
    postgresql-test-8.1.23-10.el5_10.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2