Date:         Thu, 20 May 2010 15:05:34 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Moderate: postgresql84 on SL5.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Moderate: postgresql84 security update
Issue date:	2010-05-19
CVE Names:	CVE-2010-1169 CVE-2010-1170

A flaw was found in the way PostgreSQL enforced permission checks on
scripts written in PL/Perl. If the PL/Perl procedural language was
registered on a particular database, an authenticated database user 
running a specially-crafted PL/Perl script could use this flaw to bypass 
intended PL/Perl trusted mode restrictions, allowing them to run 
arbitrary Perl scripts with the privileges of the database server. 
(CVE-2010-1169)


A flaw was found in the way PostgreSQL enforced permission checks on
scripts written in PL/Tcl. If the PL/Tcl procedural language was 
registered on a particular database, an authenticated database user 
running aspecially-crafted PL/Tcl script could use this flaw to bypass 
intended PL/Tcl trusted mode restrictions, allowing them to run 
arbitrary Tcl scripts with the privileges of the database server. 
(CVE-2010-1170)

If the postgresql service is running, it will be automatically restarted 
after installing this update.

NOTE1: postgresql84 and postgresql packages cannot be installed 
concurrently on the same system, with the exception that the 
postgresql-libs package can remain in place in parallel with 
postgresql84. The postgresql-libs package contains client-side library 
code to which existing applications may be linked. These libraries will 
still work with the newer server.

NOTE2: As 8.4.x also has on-disk data format differences from 8.1.x, it 
is not possible to upgrade an existing 8.1.x PostgreSQL database to 
8.4.x merely by replacing the packages. Instead, first dump the contents 
of the existing database using the pg_dumpall command, then shut down 
the old server and remove the database files (under 
/var/lib/pgsql/data). Next, remove the old packages and install the new 
ones; start the new server; and finally restore the data from the 
pg_dumpall output.

SL 5.x

     SRPMS:
postgresql84-8.4.4-1.el5_5.1.src.rpm
     i386:
postgresql84-8.4.4-1.el5_5.1.i386.rpm
postgresql84-contrib-8.4.4-1.el5_5.1.i386.rpm
postgresql84-devel-8.4.4-1.el5_5.1.i386.rpm
postgresql84-docs-8.4.4-1.el5_5.1.i386.rpm
postgresql84-libs-8.4.4-1.el5_5.1.i386.rpm
postgresql84-plperl-8.4.4-1.el5_5.1.i386.rpm
postgresql84-plpython-8.4.4-1.el5_5.1.i386.rpm
postgresql84-pltcl-8.4.4-1.el5_5.1.i386.rpm
postgresql84-python-8.4.4-1.el5_5.1.i386.rpm
postgresql84-server-8.4.4-1.el5_5.1.i386.rpm
postgresql84-tcl-8.4.4-1.el5_5.1.i386.rpm
postgresql84-test-8.4.4-1.el5_5.1.i386.rpm
     x86_64:
postgresql84-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-contrib-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-devel-8.4.4-1.el5_5.1.i386.rpm
postgresql84-devel-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-docs-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-libs-8.4.4-1.el5_5.1.i386.rpm
postgresql84-libs-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-plperl-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-plpython-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-pltcl-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-python-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-server-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-tcl-8.4.4-1.el5_5.1.x86_64.rpm
postgresql84-test-8.4.4-1.el5_5.1.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2010-1169 Moderate: postgresql84 SL5.x i386/x86_64

Moderate: postgresql84 security update

Summary

registered on a particular database, an authenticated database userrunning a specially-crafted PL/Perl script could use this flaw to bypassintended PL/Perl trusted mode restrictions, allowing them to runarbitrary Perl scripts with the privileges of the database server.(CVE-2010-1169)A flaw was found in the way PostgreSQL enforced permission checks onscripts written in PL/Tcl. If the PL/Tcl procedural language wasregistered on a particular database, an authenticated database userrunning aspecially-crafted PL/Tcl script could use this flaw to bypassintended PL/Tcl trusted mode restrictions, allowing them to runarbitrary Tcl scripts with the privileges of the database server.(CVE-2010-1170)If the postgresql service is running, it will be automatically restartedafter installing this update.NOTE1: postgresql84 and postgresql packages cannot be installedconcurrently on the same system, with the exception that thepostgresql-libs package can remain in place in parallel withpostgresql84. The postgresql-libs package contains client-side librarycode to which existing applications may be linked. These libraries willstill work with the newer server.NOTE2: As 8.4.x also has on-disk data format differences from 8.1.x, itis not possible to upgrade an existing 8.1.x PostgreSQL database to8.4.x merely by replacing the packages. Instead, first dump the contentsof the existing database using the pg_dumpall command, then shut downthe old server and remove the database files (under/var/lib/pgsql/data). Next, remove the old packages and install the newones; start the new server; and finally restore the data from thepg_dumpall output.SL 5.xSRPMS:postgresql84-8.4.4-1.el5_5.1.src.rpmi386:postgresql84-8.4.4-1.el5_5.1.i386.rpmpostgresql84-contrib-8.4.4-1.el5_5.1.i386.rpmpostgresql84-devel-8.4.4-1.el5_5.1.i386.rpmpostgresql84-docs-8.4.4-1.el5_5.1.i386.rpmpostgresql84-libs-8.4.4-1.el5_5.1.i386.rpmpostgresql84-plperl-8.4.4-1.el5_5.1.i386.rpmpostgresql84-plpython-8.4.4-1.el5_5.1.i386.rpmpostgresql84-pltcl-8.4.4-1.el5_5.1.i386.rpmpostgresql84-python-8.4.4-1.el5_5.1.i386.rpmpostgresql84-server-8.4.4-1.el5_5.1.i386.rpmpostgresql84-tcl-8.4.4-1.el5_5.1.i386.rpmpostgresql84-test-8.4.4-1.el5_5.1.i386.rpmx86_64:postgresql84-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-contrib-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-devel-8.4.4-1.el5_5.1.i386.rpmpostgresql84-devel-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-docs-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-libs-8.4.4-1.el5_5.1.i386.rpmpostgresql84-libs-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-plperl-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-plpython-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-pltcl-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-python-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-server-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-tcl-8.4.4-1.el5_5.1.x86_64.rpmpostgresql84-test-8.4.4-1.el5_5.1.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity
Issued Date: : 2010-05-19
CVE Names: CVE-2010-1169 CVE-2010-1170
A flaw was found in the way PostgreSQL enforced permission checks on
scripts written in PL/Perl. If the PL/Perl procedural language was