drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in postgresql
Name: |
Ausführen beliebiger Kommandos in postgresql |
|
ID: |
RHSA-2007:0337-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Application Stack |
|
Datum: |
Do, 3. Mai 2007, 14:44 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138 |
|
Applikationen: |
PostgreSQL |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Moderate: postgresql security update Advisory ID: RHSA-2007:0337-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0337.html Issue date: 2007-05-03 Updated on: 2007-05-03 Product: Red Hat Application Stack CVE Names: CVE-2007-2138 - ---------------------------------------------------------------------
1. Summary:
Updated postgresql packages that fix several security vulnerabilities are now available for the Red Hat Application Stack.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - i386, x86_64 Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - i386, x86_64
3. Problem description:
PostgreSQL is an advanced Object-Relational database management system (DBMS).
A flaw was found in the way PostgreSQL allows authenticated users to execute security-definer functions. It was possible for an unprivileged user to execute arbitrary code with the privileges of the security-definer function. (CVE-2007-2138)
Users of PostgreSQL should upgrade to these updated packages containing PostgreSQL version 8.1.9 which corrects this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
237681 - CVE-2007-2138 PostgreSQL security-definer function privilege escalation
6. RPMs required:
Red Hat Application Stack v1 for Enterprise Linux AS (v.4):
SRPMS: postgresql-8.1.9-1.el4s1.1.src.rpm ac6673966f6ca330d519f730b6e6b902 postgresql-8.1.9-1.el4s1.1.src.rpm
i386: 7bdf73fcce282e76f7f87704e6dbe799 postgresql-8.1.9-1.el4s1.1.i386.rpm d0d46be6080513c63a823c9d2df3ced7 postgresql-contrib-8.1.9-1.el4s1.1.i386.rpm 4bd680dcb7475c4bed0f08d9793072ed postgresql-debuginfo-8.1.9-1.el4s1.1.i386.rpm ac2262c828a76e3cfb5a69227cb12d35 postgresql-devel-8.1.9-1.el4s1.1.i386.rpm 48e6f67154ec571dc28ed6fff31cc20f postgresql-docs-8.1.9-1.el4s1.1.i386.rpm fe781d186949b2da0cb28405ebcf7b81 postgresql-libs-8.1.9-1.el4s1.1.i386.rpm 9786fb3979752ed4a3556e0c9aa49a02 postgresql-pl-8.1.9-1.el4s1.1.i386.rpm e4df78eccaa805dcba8f80355da3464f postgresql-python-8.1.9-1.el4s1.1.i386.rpm 38665c2a571a160664f2c620b4dfbfc5 postgresql-server-8.1.9-1.el4s1.1.i386.rpm 63bd690140a6d7b01deb2f2cb9135ada postgresql-tcl-8.1.9-1.el4s1.1.i386.rpm 02c837f84eebd06cb96bf9e7561f1c66 postgresql-test-8.1.9-1.el4s1.1.i386.rpm
x86_64: 1d0fa353bff1d96850c611c3d8419698 postgresql-8.1.9-1.el4s1.1.x86_64.rpm bc965f41161ef6dda62952bcf643903c postgresql-contrib-8.1.9-1.el4s1.1.x86_64.rpm 4bd680dcb7475c4bed0f08d9793072ed postgresql-debuginfo-8.1.9-1.el4s1.1.i386.rpm 248052c78a373193ed6bd67c67917cbf postgresql-debuginfo-8.1.9-1.el4s1.1.x86_64.rpm 6ec7f44962c815d5d7b76f4ce3784989 postgresql-devel-8.1.9-1.el4s1.1.x86_64.rpm b21757083e7743d48efd68f14c5ded31 postgresql-docs-8.1.9-1.el4s1.1.x86_64.rpm fe781d186949b2da0cb28405ebcf7b81 postgresql-libs-8.1.9-1.el4s1.1.i386.rpm 0bc77df0bf637ced8b7f014bdfb6d0ce postgresql-libs-8.1.9-1.el4s1.1.x86_64.rpm 53f0519d6223178201cb9aeb3f42fd5b postgresql-pl-8.1.9-1.el4s1.1.x86_64.rpm 0d5b51fe91221c46b0ac9b2bf6d7bb9c postgresql-python-8.1.9-1.el4s1.1.x86_64.rpm e04d104455d70e6c8a10a690de2a2bee postgresql-server-8.1.9-1.el4s1.1.x86_64.rpm 2c17ba90505848a4d785f876aab8c021 postgresql-tcl-8.1.9-1.el4s1.1.x86_64.rpm 0732ab0ec89667d35e9a78e97ada4638 postgresql-test-8.1.9-1.el4s1.1.x86_64.rpm
Red Hat Application Stack v1 for Enterprise Linux ES (v.4):
SRPMS: postgresql-8.1.9-1.el4s1.1.src.rpm ac6673966f6ca330d519f730b6e6b902 postgresql-8.1.9-1.el4s1.1.src.rpm
i386: 7bdf73fcce282e76f7f87704e6dbe799 postgresql-8.1.9-1.el4s1.1.i386.rpm d0d46be6080513c63a823c9d2df3ced7 postgresql-contrib-8.1.9-1.el4s1.1.i386.rpm 4bd680dcb7475c4bed0f08d9793072ed postgresql-debuginfo-8.1.9-1.el4s1.1.i386.rpm ac2262c828a76e3cfb5a69227cb12d35 postgresql-devel-8.1.9-1.el4s1.1.i386.rpm 48e6f67154ec571dc28ed6fff31cc20f postgresql-docs-8.1.9-1.el4s1.1.i386.rpm fe781d186949b2da0cb28405ebcf7b81 postgresql-libs-8.1.9-1.el4s1.1.i386.rpm 9786fb3979752ed4a3556e0c9aa49a02 postgresql-pl-8.1.9-1.el4s1.1.i386.rpm e4df78eccaa805dcba8f80355da3464f postgresql-python-8.1.9-1.el4s1.1.i386.rpm 38665c2a571a160664f2c620b4dfbfc5 postgresql-server-8.1.9-1.el4s1.1.i386.rpm 63bd690140a6d7b01deb2f2cb9135ada postgresql-tcl-8.1.9-1.el4s1.1.i386.rpm 02c837f84eebd06cb96bf9e7561f1c66 postgresql-test-8.1.9-1.el4s1.1.i386.rpm
x86_64: 1d0fa353bff1d96850c611c3d8419698 postgresql-8.1.9-1.el4s1.1.x86_64.rpm bc965f41161ef6dda62952bcf643903c postgresql-contrib-8.1.9-1.el4s1.1.x86_64.rpm 4bd680dcb7475c4bed0f08d9793072ed postgresql-debuginfo-8.1.9-1.el4s1.1.i386.rpm 248052c78a373193ed6bd67c67917cbf postgresql-debuginfo-8.1.9-1.el4s1.1.x86_64.rpm 6ec7f44962c815d5d7b76f4ce3784989 postgresql-devel-8.1.9-1.el4s1.1.x86_64.rpm b21757083e7743d48efd68f14c5ded31 postgresql-docs-8.1.9-1.el4s1.1.x86_64.rpm fe781d186949b2da0cb28405ebcf7b81 postgresql-libs-8.1.9-1.el4s1.1.i386.rpm 0bc77df0bf637ced8b7f014bdfb6d0ce postgresql-libs-8.1.9-1.el4s1.1.x86_64.rpm 53f0519d6223178201cb9aeb3f42fd5b postgresql-pl-8.1.9-1.el4s1.1.x86_64.rpm 0d5b51fe91221c46b0ac9b2bf6d7bb9c postgresql-python-8.1.9-1.el4s1.1.x86_64.rpm e04d104455d70e6c8a10a690de2a2bee postgresql-server-8.1.9-1.el4s1.1.x86_64.rpm 2c17ba90505848a4d785f876aab8c021 postgresql-tcl-8.1.9-1.el4s1.1.x86_64.rpm 0732ab0ec89667d35e9a78e97ada4638 postgresql-test-8.1.9-1.el4s1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138 http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFGOdjUXlSAg2UNWIIRAq2fAJ9aTW7yUzdsYrJ7Pgio361rUSlxpACfc7kY ayrkuBkn68CC/Fs0nGAQMNs= =m7Yv -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|