Description of problem: CAN-2005-0227 and other issues: LOAD command allows unprivileged local database users to cause server to execute arbitrary code. CREATE AGGREGATE bypasses check for EXECUTE permission on functions. Buffer overrun in plpgsql parser. Potential crashes in various contrib modules. Version-Release number of selected component (if applicable): rh-postgresql-7.3.8-2 How reproducible: 100% Steps to Reproduce: 1. See upstream bug reports. 2. 3. Actual results: Expected results: Additional info: Intended fix is to update to PostgreSQL 7.3.9-1, which fixes these issues as well as a couple of non-security-related bugs. The same issues need to be fixed in postgresql for AS2.1; however the upstream community has not produced patches for postgres 7.1. The vulnerabilities are already public, so no need for embargo.
A permission checking flaw in PostgreSQL was discovered. A local user could bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0244 to this issue. Multiple buffer overflows were found in PL/PgSQL. A database user who has permissions to create plpgsql functions could trigger this flaw which could lead to arbitrary code execution, gaining the privileges of the PostgreSQL server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2005-0245 and CAN-2005-0247 to these issues. A flaw in the integer aggregator (intagg) contrib module for PostgreSQL was found. A user could create carefully crafted arrays and cause a denial of service (crash). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0246 to this issue.
I've filed a separate bug #147703 for the AS2.1 branch.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-141.html