User: Password:
|
|
Subscribe / Log in / New account

rPath alert rPSA-2007-0025-2 (postgresql)

From:  rPath Update Announcements <announce-noreply@rpath.com>
To:  security-announce@lists.rpath.com, update-announce@lists.rpath.com
Subject:  rPSA-2007-0025-2 postgresql postgresql-server
Date:  Wed, 07 Feb 2007 22:37:53 -0500
Cc:  full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com, lwn@lwn.net

rPath Security Advisory: 2007-0025-2 Published: 2007-02-06 Updated: 2007-02-07 PostgreSQL 8.1.8 corrects regression Products: rPath Linux 1 Rating: Major Exposure Level Classification: Local User Deterministic Vulnerability Updated Versions: postgresql=/conary.rpath.com@rpl:devel//1/8.1.7-0.1-1 postgresql-server=/conary.rpath.com@rpl:devel//1/8.1.7-0.1-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... https://issues.rpath.com/browse/RPL-830 https://issues.rpath.com/browse/RPL-1025 Description: Previous versions of the postgresql package are vulnerable to two attacks in which an authenticated database user can cause the database server process to crash (Denial of Service), and possibly also read privileged database content (Information Exposure). 7 February 2007 Update: The security fix provided in PostgreSQL 8.1.7 introduced a functional regression: it added an overly-restrictive check for type length in constraints and functional indexes. PostgreSQL 8.1.8 corrects this error.


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds