Description of problem:
CAN-2005-0227 and other issues:
LOAD command allows unprivileged local database users to cause server
to execute arbitrary code.
CREATE AGGREGATE bypasses check for EXECUTE permission on functions.
Buffer overrun in plpgsql parser.
Potential crashes in various contrib modules.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. See upstream bug reports.
These issues need to be patched in prior releases as well.
The vulnerabilities are already public, so no need for embargo.
Intended fix for RHEL4 is to update to PostgreSQL 7.4.7, which
contains these fixes as well as assorted non-security-severity bug
A flaw in the LOAD command in PostgreSQL was discovered. A local user
could use this flaw to load arbitrary shared librarys and therefore
arbitrary code, gaining the privileges of the PostgreSQL server. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0227 to this issue.
A permission checking flaw in PostgreSQL was discovered. A local user
could bypass the EXECUTE permission check for functions by using the
AGGREGATE command. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0244 to this issue.
Multiple buffer overflows were found in PL/PgSQL. A database user who has
permissions to create plpgsql functions could trigger this flaw which
lead to arbitrary code execution, gaining the privileges of the PostgreSQL
server. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CAN-2005-0245 and CAN-2005-0247 to these issues.
A flaw in the integer aggregator (intagg) contrib module for
found. A user could create carefully crafted arrays and cause a denial of
service (crash). The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0246 to this issue.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.