Skip to navigation

Security Advisory Updated PostgreSQL packages fix security issues and bugs

Advisory: RHSA-2003:001-16
Type: Security Advisory
Severity: N/A
Issued on: 2003-01-14
Last updated on: 2003-01-14
Affected Products: Red Hat Linux 7.3
Red Hat Linux 8.0
CVEs (cve.mitre.org): CVE-2002-0972
CVE-2002-1397
CVE-2002-1398
CVE-2002-1400
CVE-2002-1401
CVE-2002-1402

Details

Updated PostgreSQL packages are available for Red Hat Linux 7.3 and 8.0.
These packages correct several security and other bugs. A separate
advisory deals with updated PostgreSQL packages for Red Hat Linux 6.2, 7,
7.1, and 7.2.

PostgreSQL is an advanced Object-Relational database management system.
Red Hat Linux 7.3 shipped with PostgreSQL version 7.2.1. Red Hat Linux 8.0
shipped with PostgreSQL version 7.2.2.

PostgreSQL versions 7.2.1 and 7.2.2 contain a serious issue with the VACUUM
command when it is run by a non-superuser. It is possible for the system
to prematurely remove old transaction log data (pg_clog files), which can
result in unrecoverable data loss.

A number of minor security issues affect the PostgreSQL 7.2.1 packages
shipped with Red Hat Linux 7.3 only:

1. Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of
service and possibly execute arbitrary code via long arguments to the lpad
or rpad functions. CAN-2002-0972

2. Buffer overflow in the cash_words() function allows local users to cause
a denial of service and possibly execute arbitrary code via a malformed
argument. CAN-2002-1397

3. Buffer overflow in the date parser allows attackers to cause a denial of
service and possibly execute arbitrary code via a long date string, also
known as a vulnerability "in handling long datetime input." CAN-2002-1398

4. Heap-based buffer overflow in the repeat() function allows attackers to
execute arbitrary code by causing repeat() to generate a large string.
CAN-2002-1400

5. Buffer overflows in the TZ and SET TIME ZONE enivronment variables allow
local users to cause a denial of service and possibly execute arbitrary
code. CAN-2002-1402

Additionally, buffer overflows in circle_poly, path_encode and path_add
allow attackers to cause a denial of service and possibly execute arbitrary
code. Note that these overflows have been fixed in our erratum packages and
in PostgreSQL CVS, but are not fixed in the released versions of PostgreSQL
version 7.2.3. CAN-2002-1401

The above vulnerabilities are only critical on open or shared systems
because connecting to the database is required before the vulnerabilities
can be exploited.

This update also contains fixes for several other PostgreSQL bugs,
including handling of pre-1970 date values in newer versions of glibc,
possible server shutdown hangs, spinlock hangs on SMP PPC machines, and
pg_dump improperly dumping with the FULL JOIN USING clauses.

All users of PostgreSQL should upgrade to these errata packages containing
PostgreSQL 7.2.3 with additional patches to correct all these issues. Note
that running initdb is not necessary when upgrading from 7.2.1 or 7.2.2 to
the packages contained in this errata.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Linux 7.3

SRPMS:
postgresql-7.2.3-5.73.src.rpm
File outdated by:  RHSA-2003:313
    MD5: 34e14436281e3beea42ee984bceabeb8
 
IA-32:
postgresql-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: edba57794dc188ddb4dd8408d2b351e2
postgresql-contrib-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: e71f0771204fe8293f1aa90f09f6481e
postgresql-devel-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 58e695f58687a72bfc1ead13a301dae3
postgresql-docs-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: c8ff56f25004f8da3fcab97a00645a3c
postgresql-jdbc-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 551c10daca662b4514ed0ca9f57181e3
postgresql-libs-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 517c6bd62d0a82cdbb9a452b09e42ded
postgresql-odbc-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: a942a652ae89df1aa0284b7c73348187
postgresql-perl-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 51865efb9f3e491d497b18713d12a370
postgresql-python-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 743471a3e5a2dbbaa376b58583519e92
postgresql-server-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: a65ed55398c08dfd9ef2cc48dcf620fb
postgresql-tcl-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 822f7424c23e9597755ad78dd4b2cedf
postgresql-test-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 9d632c76040305e701eb925656fd512e
postgresql-tk-7.2.3-5.73.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 9dfa1a633958e1148b33f3122ed9a943
 
Red Hat Linux 8.0

SRPMS:
postgresql-7.2.3-5.80.src.rpm
File outdated by:  RHSA-2003:313
    MD5: 116fabd54ec3a3235ec8bb9946991001
 
IA-32:
postgresql-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: fa4bc52fd3733243874959805f23790f
postgresql-contrib-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: c2616bfa68911cb6072cee5da26ee4c7
postgresql-devel-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 7b7183842f7e5bbe0bb3652410443ce1
postgresql-docs-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: a03b33fa750a9548bfc7050863b64ebe
postgresql-jdbc-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 06f18f7d31287f6731aea08593624866
postgresql-libs-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: ebd03dbfc757b629dac9bb017d918ef4
postgresql-odbc-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: e2511b0ebbcecc1580d5585fe53603f6
postgresql-perl-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: e07c50d8f035340cd9db90c77179b238
postgresql-python-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 8527468481312aeaf2b4ea3a5a5731a1
postgresql-server-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: f5a061d396f96898aecc2570a1703cfa
postgresql-tcl-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 259de5a30643984be397b7d0d2ad66f4
postgresql-test-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 32eebb139b6dca1cc4ae562fb3d608f3
postgresql-tk-7.2.3-5.80.i386.rpm
File outdated by:  RHSA-2003:313
    MD5: 8bd5bb78a954eac4ee0c0c7c98a79dde
 

References


Keywords

PostgreSQL, pre-1970, spinlock, VACUUM


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/