A security flaw was found in the way pg_dump utility of PostgreSQL extracted information about particular database into script or other archive file for database objects, containing new line '\n' character in their names. An unprivileged database user could create a specially-crafted database object and use this flaw to perform arbitrary SQL command (SQL injection), when an unsuspecting database administrator reloaded such (previously dumped) script or archive file. References: [1] http://www.postgresql.org/support/security/
This issue affects the versions of the postgresql and postgresql84 package, as shipped with Red Hat Enterprise Linux 5. -- This issue affects the version of the postgresql package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the postgresql package, as shipped with Fedora release of 15 and 16. Please schedule an update.
Created postgresql tracking bugs for this issue Affects: fedora-all [bug 797918]
postgresql-9.1.3-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
postgresql-9.1.3-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
postgresql-9.0.7-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0677 https://rhn.redhat.com/errata/RHSA-2012-0677.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2012:0678 https://rhn.redhat.com/errata/RHSA-2012-0678.html