Skip to navigation

Security Advisory Moderate: perl-DBD-Pg security update

Advisory: RHSA-2009:0479-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-05-13
Last updated on: 2009-05-13
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2009-0663
CVE-2009-1341

Details

An updated perl-DBD-Pg package that fixes two security issues is now
available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Perl DBI is a database access Application Programming Interface (API) for
the Perl language. perl-DBD-Pg allows Perl applications to access
PostgreSQL database servers.

A heap-based buffer overflow flaw was discovered in the pg_getline function
implementation. If the pg_getline or getline functions read large,
untrusted records from a database, it could cause an application using
these functions to crash or, possibly, execute arbitrary code.
(CVE-2009-0663)

Note: After installing this update, pg_getline may return more data than
specified by its second argument, as this argument will be ignored. This is
consistent with current upstream behavior. Previously, the length limit
(the second argument) was not enforced, allowing a buffer overflow.

A memory leak flaw was found in the function performing the de-quoting of
BYTEA type values acquired from a database. An attacker able to cause an
application using perl-DBD-Pg to perform a large number of SQL queries
returning BYTEA records, could cause the application to use excessive
amounts of memory or, possibly, crash. (CVE-2009-1341)

All users of perl-DBD-Pg are advised to upgrade to this updated package,
which contains backported patches to fix these issues. Applications using
perl-DBD-Pg must be restarted for the update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
perl-DBD-Pg-1.49-2.el5_3.1.src.rpm
File outdated by:  RHSA-2012:1116
    MD5: b1bff465930e39cc0ef834cc1140d0ba
 
IA-32:
perl-DBD-Pg-1.49-2.el5_3.1.i386.rpm
File outdated by:  RHSA-2012:1116
    MD5: 9e7cca60346a1d8eaf100ae63812bf1a
 
IA-64:
perl-DBD-Pg-1.49-2.el5_3.1.ia64.rpm
File outdated by:  RHSA-2012:1116
    MD5: 533332a20d71f6367a1a50a7fc22ce87
 
PPC:
perl-DBD-Pg-1.49-2.el5_3.1.ppc.rpm
File outdated by:  RHSA-2012:1116
    MD5: 459a6ffd4cfd23f62b945da17ea45f8c
 
s390x:
perl-DBD-Pg-1.49-2.el5_3.1.s390x.rpm
File outdated by:  RHSA-2012:1116
    MD5: 1a44acf7aba4991a5562b5b70afb6b71
 
x86_64:
perl-DBD-Pg-1.49-2.el5_3.1.x86_64.rpm
File outdated by:  RHSA-2012:1116
    MD5: e6a5908969aed3994eb29b97a679b6be
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
perl-DBD-Pg-1.49-2.el5_3.1.src.rpm
File outdated by:  RHSA-2012:1116
    MD5: b1bff465930e39cc0ef834cc1140d0ba
 
IA-32:
perl-DBD-Pg-1.49-2.el5_3.1.i386.rpm
File outdated by:  RHSA-2012:1116
    MD5: 9e7cca60346a1d8eaf100ae63812bf1a
 
x86_64:
perl-DBD-Pg-1.49-2.el5_3.1.x86_64.rpm
File outdated by:  RHSA-2012:1116
    MD5: e6a5908969aed3994eb29b97a679b6be
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
perl-DBD-Pg-1.49-2.el5_3.1.src.rpm
File outdated by:  RHSA-2012:1116
    MD5: b1bff465930e39cc0ef834cc1140d0ba
 
IA-32:
perl-DBD-Pg-1.49-2.el5_3.1.i386.rpm     MD5: 9e7cca60346a1d8eaf100ae63812bf1a
 
IA-64:
perl-DBD-Pg-1.49-2.el5_3.1.ia64.rpm     MD5: 533332a20d71f6367a1a50a7fc22ce87
 
PPC:
perl-DBD-Pg-1.49-2.el5_3.1.ppc.rpm     MD5: 459a6ffd4cfd23f62b945da17ea45f8c
 
s390x:
perl-DBD-Pg-1.49-2.el5_3.1.s390x.rpm     MD5: 1a44acf7aba4991a5562b5b70afb6b71
 
x86_64:
perl-DBD-Pg-1.49-2.el5_3.1.x86_64.rpm     MD5: e6a5908969aed3994eb29b97a679b6be
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
perl-DBD-Pg-1.49-2.el5_3.1.src.rpm
File outdated by:  RHSA-2012:1116
    MD5: b1bff465930e39cc0ef834cc1140d0ba
 
IA-32:
perl-DBD-Pg-1.49-2.el5_3.1.i386.rpm     MD5: 9e7cca60346a1d8eaf100ae63812bf1a
 
IA-64:
perl-DBD-Pg-1.49-2.el5_3.1.ia64.rpm     MD5: 533332a20d71f6367a1a50a7fc22ce87
 
x86_64:
perl-DBD-Pg-1.49-2.el5_3.1.x86_64.rpm     MD5: e6a5908969aed3994eb29b97a679b6be
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

497367 - CVE-2009-0663 perl-DBD-Pg: pg_getline buffer overflow
497503 - CVE-2009-1341 perl-DBD-Pg: dequote_bytea memory leak


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/