Description of problem: CAN-2005-0227 and other issues: LOAD command allows unprivileged local database users to cause server to execute arbitrary code. CREATE AGGREGATE bypasses check for EXECUTE permission on functions. Buffer overrun in plpgsql parser. Potential crashes in various contrib modules. Version-Release number of selected component (if applicable): 7.4.6-1.RHEL4.2 How reproducible: 100% Steps to Reproduce: 1. See upstream bug reports. 2. 3. Actual results: Expected results: Additional info: These issues need to be patched in prior releases as well. The vulnerabilities are already public, so no need for embargo.
Intended fix for RHEL4 is to update to PostgreSQL 7.4.7, which contains these fixes as well as assorted non-security-severity bug fixes.
A flaw in the LOAD command in PostgreSQL was discovered. A local user could use this flaw to load arbitrary shared librarys and therefore execute arbitrary code, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0227 to this issue. A permission checking flaw in PostgreSQL was discovered. A local user could bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0244 to this issue. Multiple buffer overflows were found in PL/PgSQL. A database user who has permissions to create plpgsql functions could trigger this flaw which could lead to arbitrary code execution, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2005-0245 and CAN-2005-0247 to these issues. A flaw in the integer aggregator (intagg) contrib module for PostgreSQL was found. A user could create carefully crafted arrays and cause a denial of service (crash). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0246 to this issue.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-138.html