Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in postgresql
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in postgresql
ID: SUSE-SA:2005:027
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 8, SUSE Linux 8.2, SUSE Linux Desktop 1.0, SUSE Linux 9.0, SUSE Linux 9.1, SUSE Linux Enterprise Server 9, SUSE Linux 9.2, SUSE Novell Linux Desktop 9, SUSE Linux 9.3
Datum: Do, 21. April 2005, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0247
Applikationen: PostgreSQL

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________

SUSE Security Announcement

Package: postgresql
Announcement-ID: SUSE-SA:2005:027
Date: Wed, 20 Apr 2005 09:00:00 +0000
Affected products: 8.2, 9.0, 9.1, 9.2, 9.3
SUSE Linux Desktop 1.0
SUSE Linux Enterprise Server 8, 9
Novell Linux Desktop 9
Vulnerability Type: remote code execution
Severity (1-10): 5
SUSE default package: no
Cross References: CAN-2005-0247

Content of this advisory:
1) security vulnerability resolved:
code execution due to bugs in several SQL commands
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
none
6) standard appendix (further information)

______________________________________________________________________________

1) problem description, brief discussion

Several problems were identified and fixed in the PostgreSQL
database server.

Multiple buffer overflows in the low level parsing routines may
allow attackers to execute arbitrary code via:

(1) a large number of variables in a SQL statement being handled by
the read_sql_construct() function,

(2) a large number of INTO variables in a SELECT statement being
handled by the make_select_stmt function,

(3) a large number of arbitrary variables in a SELECT statement being
handled by the make_select_stmt function, and

(4) a large number of INTO variables in a FETCH statement being
handled by the make_fetch_stmt function.


This is tracked by the Mitre CVE ID CAN-2005-0247.

2) solution/workaround

None, please install the updated packages.

3) special instructions and notes

If you are running a PostgreSQL server please make sure that it
is stopped or at least doesn't have any client connections during
the update.

4) package location and checksums

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to
apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.


x86 Platform:

SUSE Linux 9.3:
postgresql-8.0.1-6.i586.rpm
678cf8fac25f43217a75ff1b69afa1e1
postgresql-contrib-8.0.1-6.i586.rpm
9f71e3a477cb37e96b6252d3e41af5d0
postgresql-devel-8.0.1-6.i586.rpm
13befe8d62a70898b576f46332b04016
postgresql-docs-8.0.1-6.i586.rpm
d51a60a473567c87c3f94cc0d5abde2d
postgresql-libs-8.0.1-6.i586.rpm
50af9cba7571c4859b033a420782c5c3
postgresql-pl-8.0.1-6.i586.rpm
3d68c0e2f026e3c1f1d33ec828ade723
postgresql-server-8.0.1-6.i586.rpm
4601a1e4308348a7a27fbe4dd0bfe029
postgresql-libs-32bit-9.3-7.1.x86_64.rpm
55c4a7c5b510b4a05b789540adbcca00

SUSE Linux 9.2:
postgresql-7.4.7-0.3.i586.rpm
6d5ca6b626a70cee2b34e49d33855648
postgresql-contrib-7.4.7-0.3.i586.rpm
62020a1c26ed41635cf07f37f1c22817
postgresql-devel-7.4.7-0.3.i586.rpm
eb20f825e8c1ee955e6904bd718ad1ba
postgresql-docs-7.4.7-0.3.i586.rpm
79194edc8a6a6ad10104b964e66cf789
postgresql-libs-7.4.7-0.3.i586.rpm
67353952335be148e0f3719a50edf8c5
postgresql-pl-7.4.7-0.3.i586.rpm
caad51baf0dfca24df09fec5d4385555
postgresql-server-7.4.7-0.3.i586.rpm
55a89a0f695e5dc892fa31af6140e367
postgresql-libs-32bit-9.2-200504131606.x86_64.rpm
91ac32a40b548d187ca78fb095f182ac

SUSE Linux 9.1:
postgresql-7.4.7-0.5.i586.rpm
7027aa706e60a5074b294edba529479c
postgresql-contrib-7.4.7-0.5.i586.rpm
f7f3ef933b3cef23e892ede41d30b7e2
postgresql-devel-7.4.7-0.5.i586.rpm
8b48f30541f0834d14c7c1297202a55f
postgresql-docs-7.4.7-0.5.i586.rpm
e4456b0be9e08ffab52bc8476d2a25c8
postgresql-libs-7.4.7-0.5.i586.rpm
9a936afc00a75b243c7c7bd040eb3e97
postgresql-pl-7.4.7-0.5.i586.rpm
7037b8f9f9ca4d0c3325b1f52a38338c
postgresql-server-7.4.7-0.5.i586.rpm
a6699829779cf0f1adc9eb899e028cce
postgresql-libs-32bit-9.1-200504131537.i586.rpm
6d7c782b577a97024d5b388957686eb9
source rpm(s):
postgresql-7.4.7-0.5.src.rpm
10074702f7983e615b0d4da932915419

SUSE Linux 9.0:
postgresql-7.3.9-7.i586.rpm
dbefa2ff236099277275e050196832f9
postgresql-contrib-7.3.9-7.i586.rpm
9e933821ae869b86c9dbb9899df86d75
postgresql-devel-7.3.9-7.i586.rpm
8c2f83c0acb4bda10989a90082126324
postgresql-docs-7.3.9-7.i586.rpm
4fa5151ac425ef2765600082c8772d38
postgresql-libs-7.3.9-7.i586.rpm
c038222567e7692081dfef91f56fa73b
postgresql-pl-7.3.9-7.i586.rpm
57730936587d5214f45d498721abc0d4
postgresql-server-7.3.9-7.i586.rpm
a66b7aa7172c4accefad29b98b725452
postgresql-test-7.3.9-7.i586.rpm
c2d0256ea4ce83f12e73e4f23a0f4929
postgresql-libs-32bit-9.0-4.i586.rpm
0a754eb5f8535cd7a291ffefb724f537
source rpm(s):
postgresql-7.3.9-7.src.rpm
174eb88726ae089eb80327613d0191c9

SUSE Linux 8.2:
postgresql-7.3.9-6.i586.rpm
a2b5993ddc330ffc4caf596b95cd44da
postgresql-contrib-7.3.9-6.i586.rpm
80f40fb76c5eb8b04634836f5da87839
postgresql-devel-7.3.9-6.i586.rpm
e97783f94a2e103b4f36d8309525e03b
postgresql-docs-7.3.9-6.i586.rpm
df6f2407af9063765d3100efda4e9fd7
postgresql-libs-7.3.9-6.i586.rpm
158525f64b5ce8b4e84307442c55cf69
postgresql-pl-7.3.9-6.i586.rpm
b214dab6c7691e408c8cb94f3d89266b
postgresql-server-7.3.9-6.i586.rpm
ef2c190ddcca664c6d24c30cee18b06a
postgresql-test-7.3.9-6.i586.rpm
598bc10d2956c68c44bbc15c1048b961
source rpm(s):
postgresql-7.3.9-6.src.rpm
b9607afe3c591211cd4828387b78e844

x86-64 Platform:

SUSE Linux 9.3:
postgresql-8.0.1-6.x86_64.rpm
a608a80f0c5e52244ef0e06f71179eec
postgresql-contrib-8.0.1-6.x86_64.rpm
3fc4c4e413857244670ec31d132ecf6e
postgresql-devel-8.0.1-6.x86_64.rpm
604493537efd3eefdb6c2268c76d9fce
postgresql-docs-8.0.1-6.x86_64.rpm
4f9cdf3fef5cbc05655a61c0d40188ac
postgresql-libs-8.0.1-6.x86_64.rpm
1693e687c7175143a8417a1971b7561d
postgresql-pl-8.0.1-6.x86_64.rpm
231201858f97d931a342cc54197fede0
postgresql-server-8.0.1-6.x86_64.rpm
cf53838797c30f7c0d6c20780b3df994
source rpm(s):
postgresql-8.0.1-6.src.rpm
72d273fb0e710ce3b36f8a75760faca0
postgresql-pl-8.0.1-6.nosrc.rpm
b12ca9ab8d1e1403d64608447cef61af

SUSE Linux 9.2:
postgresql-7.4.7-0.3.x86_64.rpm
376426e12fa067ed9750ff729e7af64f
postgresql-contrib-7.4.7-0.3.x86_64.rpm
a2a1174114c9f2cd8b0bd24dc15603ad
postgresql-devel-7.4.7-0.3.x86_64.rpm
52c49022348810ee55dc74a986a10324
postgresql-docs-7.4.7-0.3.x86_64.rpm
c4ffdce772938cb5ca851a09eb05ccb9
postgresql-libs-7.4.7-0.3.x86_64.rpm
b89fbdd68337b6f6d557e030fdee385c
postgresql-pl-7.4.7-0.3.x86_64.rpm
6fe8b6011a779152b659b85278176084
postgresql-server-7.4.7-0.3.x86_64.rpm
94bd74ce6d5e215c0cc910227606b081
source rpm(s):
postgresql-7.4.7-0.3.src.rpm
b8c6138e39ecc4c75537c7bf99cbcee4
postgresql-pl-7.4.7-0.3.src.rpm
e9c71d98739d760557aa9719ac45083b

SUSE Linux 9.1:
postgresql-7.4.7-0.5.x86_64.rpm
000d9921b17457f420806deb0b52b864
postgresql-contrib-7.4.7-0.5.x86_64.rpm
7ae07a0f82e1c752a43f1d2f1d6f76a4
postgresql-devel-7.4.7-0.5.x86_64.rpm
959493267003db19075030c88b288e53
postgresql-docs-7.4.7-0.5.x86_64.rpm
452dc62ada42a821a7d6e8bc79e6fbd8
postgresql-libs-7.4.7-0.5.x86_64.rpm
6d07eec96e67f4c3b316b980db2ded02
postgresql-pl-7.4.7-0.5.x86_64.rpm
a9a394f502ce7d45b72e8d037513cc60
postgresql-server-7.4.7-0.5.x86_64.rpm
090f72759ce39af0b49170ff3b0e939a
source rpm(s):
postgresql-7.4.7-0.5.src.rpm
8bd7c2894ca62fe59e52f5ee79a13a8c

SUSE Linux 9.0:
postgresql-7.3.9-7.x86_64.rpm
d9b71b21317c17281a1d0b5ac058ee7e
postgresql-contrib-7.3.9-7.x86_64.rpm
df00a736fbbc1fe396ca802f28556a6e
postgresql-devel-7.3.9-7.x86_64.rpm
b1bc20c65730504cb68204644b53c3b1
postgresql-docs-7.3.9-7.x86_64.rpm
aa2a266f6cfb859e248d7c6a9168cd5d
postgresql-libs-7.3.9-7.x86_64.rpm
ff5014d8c7d7c2d3b044bb2f268c0bf8
postgresql-pl-7.3.9-7.x86_64.rpm
9e9dc0405761bde26676ad71b71d18c8
postgresql-server-7.3.9-7.x86_64.rpm
0235a9bd3d8b582c8eeec89ae5cc02ff
postgresql-test-7.3.9-7.x86_64.rpm
2cd64de68e37398c11448271c87d8f9b
source rpm(s):
postgresql-7.3.9-7.src.rpm
cb17afaeae94a5d9c982654047c46b7f


______________________________________________________________________________

5) Pending vulnerabilities in SUSE Distributions and Workarounds:

none
______________________________________________________________________________

6) standard appendix: authenticity verification, additional information

- Package authenticity verification:

SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.

1) execute the command
md5sum <name-of-the-file.rpm>
after you downloaded the file from a SUSE ftp server or its mirrors.
Then, compare the resulting md5sum with the one that is listed in the
announcement. Since the announcement containing the checksums is
cryptographically signed (usually using the key security@suse.de),
the checksums show proof of the authenticity of the package.
We disrecommend to subscribe to security lists which cause the
email message containing the announcement to be modified so that
the signature does not match after transport through the mailing
list software.
Downsides: You must be able to verify the authenticity of the
announcement in the first place. If RPM packages are being rebuilt
and a new version of a package is published on the ftp server, all
md5 sums for the files are useless.

2) rpm package signatures provide an easy way to verify the authenticity
of an rpm package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, where <file.rpm> is the
filename of the rpm package that you have downloaded. Of course,
package authenticity verification can only target an un-installed rpm
package file.
Prerequisites:
a) gpg is installed
b) The package is signed using a certain key. The public part of this
key must be installed by the gpg program in the directory
~/.gnupg/ under the user's home directory who performs the
signature verification (usually root). You can import the key
that is used by SUSE in rpm packages for SUSE Linux by saving
this announcement to a file ("announcement.txt") and
running the command (do "su -" to be root):
gpg --batch; gpg < announcement.txt | gpg --import
SUSE Linux distributions version 7.1 and thereafter install the
key "build@suse.de" upon installation or upgrade, provided
that
the package gpg is installed. The file containing the public key
is placed at the top-level directory of the first CD (pubring.gpg)
and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .


- SUSE runs two security mailing lists to which any interested party may
subscribe:

suse-security@suse.com
- general/linux/SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an email to
<suse-security-subscribe@suse.com>.

suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an email to
<suse-security-announce-subscribe@suse.com>.

For general information or the frequently asked questions (faq)
send mail to:
<suse-security-info@suse.com> or
<suse-security-faq@suse.com> respectively.

=====================================================================
SUSE's security contact is <security@suse.com> or
<security@suse.de>.
The <security@suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________

The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular,
it is desired that the clear-text signature shows proof of the
authenticity of the text.
SUSE Linux AG makes no warranties of any kind whatsoever with respect
to the information contained in this security advisory.

Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
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=LRKC
-----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iQEVAwUBQmYWjXey5gA9JdPZAQE2hgf9HiTUk55ar7ggbJwBwSxOOqxLt5fJ4z/E
REl6bZM0ti5xuk0dlbQpM4ZlSkQfajpp3SMmou2lsD8ZFteEbmbN/NZvgp3CBZRA
Ci8EnTldo3/Sfv9cUj1Obd1CGFYAost0pK+khX3QNGJOfTBOu2HVi6DCaY4PNGcP
8V09PM/8INpcWvvuX+FLZpiHMJlu3JpDArTTsTtulNoIPoe3zKa1Bjns9SdMzD/S
9o5+0xG/ObuOZqomhsBBbb4+u66Rd0fVsLTflEvbaulcvavIhgkyDQn6dkrj9za7
SvJG2vYYXtY3WZWQRJsUiM1AfMAy9mCXflk+Yj7vh1x5iKcCRBntpw==
=IWpL
-----END PGP SIGNATURE-----

--
To unsubscribe, e-mail: suse-security-announce-unsubscribe@suse.com
For additional commands, e-mail: suse-security-announce-help@suse.com
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung