Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 546621 - (CVE-2010-0733) CVE-2010-0733 postgresql: Integer overflow in hash table size calculation
CVE-2010-0733 postgresql: Integer overflow in hash table size calculation
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
http://developer.postgresql.org/pgdoc...
impact=low,source=internet,reported=2...
: Security
Depends On: 552617 586056 586057 586058 586059 589541 589543 812237
Blocks:
  Show dependency treegraph
 
Reported: 2009-12-11 08:30 EST by Jan Lieskovsky
Modified: 2016-03-04 07:08 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2010-05-26 11:09:25 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Local copy of relevant upstream patch (4.55 KB, patch)
2009-12-11 08:37 EST, Jan Lieskovsky
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0427 normal SHIPPED_LIVE Moderate: postgresql security update 2010-05-19 11:48:23 EDT
Red Hat Product Errata RHSA-2010:0428 normal SHIPPED_LIVE Moderate: postgresql security update 2010-05-19 12:15:45 EDT
Red Hat Product Errata RHSA-2010:0429 normal SHIPPED_LIVE Moderate: postgresql security update 2010-05-19 12:29:57 EDT

  None (edit)
Description Jan Lieskovsky 2009-12-11 08:30:41 EST
An integer overflow flaw was found in the way postgresql
used to calculate size for the hashtable for joined 
relations. An attacker could formulate a specially-crafted
sql query, which once processed would lead to denial of
service (postgresql daemon crash).

Upstream bug report:
--------------------
[1] http://archives.postgresql.org/pgsql-bugs/2009-10/msg00277.php

References:
-----------
[2] http://archives.postgresql.org/pgsql-bugs/2009-10/msg00287.php
[3] http://archives.postgresql.org/pgsql-bugs/2009-10/msg00310.php
[4] http://archives.postgresql.org/pgsql-bugs/2009-10/msg00289.php

Upstream patch:
---------------
git clone git://git.postgresql.org/git/postgresql.git
cd postgresql && git show 64b057e6823655fb6c5d1f24a28f236b94dd6c54

Credit:
-------
Bernt Marius Johnsen
Comment 2 Jan Lieskovsky 2009-12-11 08:37:42 EST
Created attachment 377733 [details]
Local copy of relevant upstream patch
Comment 4 Tomas Hoger 2009-12-15 05:14:16 EST
(In reply to comment #0)
> Upstream patch:
> ---------------
> git clone git://git.postgresql.org/git/postgresql.git
> cd postgresql && git show 64b057e6823655fb6c5d1f24a28f236b94dd6c54

http://git.postgresql.org/gitweb?p=postgresql.git;a=commitdiff;h=64b057e6823655fb6c5d1f24a28f236b94dd6c54
Comment 11 Vincent Danen 2010-03-09 11:44:57 EST
The Red Hat Security Response Team has rated this issue as having low security
impact, a future update may address this flaw.
Comment 12 Vincent Danen 2010-03-16 13:23:48 EDT
This one has been assigned CVE-2010-0733
Comment 19 errata-xmlrpc 2010-05-19 11:48:52 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3

Via RHSA-2010:0427 https://rhn.redhat.com/errata/RHSA-2010-0427.html
Comment 20 errata-xmlrpc 2010-05-19 12:16:05 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2010:0428 https://rhn.redhat.com/errata/RHSA-2010-0428.html
Comment 21 errata-xmlrpc 2010-05-19 12:30:07 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0429 https://rhn.redhat.com/errata/RHSA-2010-0429.html

Note You need to log in before you can comment on or make changes to this bug.