Login


 
Newsletter
Werbung
Sicherheit: Mehrere Probleme in PostgreSQL
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in PostgreSQL
ID: USN-1378-1
Distribution: Ubuntu
Plattformen: Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04, Ubuntu 11.10
Datum: Di, 28. Februar 2012, 18:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868

Originalnachricht


--===============3071450342989872483==
Content-Type: multipart/signed; micalg="pgp-sha512";
protocol="application/pgp-signature";
boundary="=-B/kFc4VgZFv5m9b//jPm"


--=-B/kFc4VgZFv5m9b//jPm
Content-Type: text/plain; charset="UTF-8
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1378-1
February 28, 2012

postgresql-8.3, postgresql-8.4, postgresql-9.1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

Several security issues were fixed in PostgreSQL.

Software Description:
- postgresql-9.1: Object-relational SQL database
- postgresql-8.4: Object-relational SQL database
- postgresql-8.3: Object-relational SQL database

Details:

It was discovered that PostgreSQL incorrectly checked permissions on
functions called by a trigger. An attacker could attach a trigger to a
table they owned and possibly escalate privileges. (CVE-2012-0866)

It was discovered that PostgreSQL incorrectly truncated SSL certificate
name checks to 32 characters. If a host name was exactly 32 characters,
this issue could be exploited by an attacker to spoof the SSL certificate.
This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and
Ubuntu 11.10. (CVE-2012-0867)

It was discovered that the PostgreSQL pg_dump utility incorrectly filtered
line breaks in object names. An attacker could create object names that
execute arbitrary SQL commands when a dump script is reloaded.
(CVE-2012-0868)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
postgresql-9.1 9.1.3-0ubuntu0.11.10

Ubuntu 11.04:
postgresql-8.4 8.4.11-0ubuntu0.11.04

Ubuntu 10.10:
postgresql-8.4 8.4.11-0ubuntu0.10.10

Ubuntu 10.04 LTS:
postgresql-8.4 8.4.11-0ubuntu0.10.04

Ubuntu 8.04 LTS:
postgresql-8.3 8.3.18-0ubuntu0.8.04

In general, a standard system update will make all the necessary changes.

This update uses a new upstream release, which includes additional bug
fixes.

References:
http://www.ubuntu.com/usn/usn-1378-1
CVE-2012-0866, CVE-2012-0867, CVE-2012-0868

Package Information:
https://launchpad.net/ubuntu/+source/postgresql-9.1/9.1.3-0ubuntu0.11.10
https://launchpad.net/ubuntu/+source/postgresql-8.4/8.4.11-0ubuntu0.11.04
https://launchpad.net/ubuntu/+source/postgresql-8.4/8.4.11-0ubuntu0.10.10
https://launchpad.net/ubuntu/+source/postgresql-8.4/8.4.11-0ubuntu0.10.04
https://launchpad.net/ubuntu/+source/postgresql-8.3/8.3.18-0ubuntu0.8.04



--Û/kFc4VgZFv5m9b//jPm
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=Qcmq
-----END PGP SIGNATURE-----

--=-B/kFc4VgZFv5m9b//jPm--



--===============3071450342989872483==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3071450342989872483==--
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung