SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   PostgreSQL Vendors:   postgresql.org
(Red Hat Issues Fix) PostgreSQL Bugs Let Remote Users Deny Service and Let Remote Authenticated Users Gain Elevated Privileges
SecurityTracker Alert ID:  1035162
SecurityTracker URL:  http://securitytracker.com/id/1035162
CVE Reference:   CVE-2016-0773   (Links to External Site)
Date:  Mar 2 2016
Impact:   Denial of service via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.1, 9.2, 9.3, 9.4, 9.5
Description:   Two vulnerabilities were reported in PostgreSQL. A remote user can cause the target service to crash. A remote authenticated user can gain elevated privileges.

A remote user can supply a specially data containing regular expressions with out-of-range Unicode characters to cause the target backend service to enter an infinite loop or crash [CVE-2016-0773].

A remote authenticated user without database superuser privileges can modify certain custom configuration settings (GUCS) for PL/Java [CVE-2016-0766].

Impact:   A remote user can cause the target service to enter an infinite loop or crash.

A remote authenticated user can gain elevated privileges on the target system.

Solution:   Red Hat has issued a fix for CVE-2016-0773.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2016-0346.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2016-0346.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Feb 11 2016 PostgreSQL Bugs Let Remote Users Deny Service and Let Remote Authenticated Users Gain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2016:0346-01] Important: postgresql security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: postgresql security update
Advisory ID:       RHSA-2016:0346-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2016-0346.html
Issue date:        2016-03-02
CVE Names:         CVE-2016-0773 
=====================================================================

1. Summary:

Updated postgresql packages that fix one security issue are now available
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the PostgreSQL handling code for regular expressions. A remote
attacker could use a specially crafted regular expression to cause
PostgreSQL to crash or possibly execute arbitrary code. (CVE-2016-0773)

Red Hat would like to thank PostgreSQL upstream for reporting this issue.
Upstream acknowledges Tom Lane and Greg Stark as the original reporters.

This update upgrades PostgreSQL to version 9.2.15. Refer to the Release
Notes linked to in the References section for a detailed list of changes
since the previous version.

All PostgreSQL users are advised to upgrade to these updated packages,
which correct this issue. If the postgresql service is running, it will
be automatically restarted after installing this update.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1303832 - CVE-2016-0773 postgresql: case insensitive range handling integer overflow leading to buffer overflow

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
postgresql-9.2.15-1.el7_2.src.rpm

x86_64:
postgresql-9.2.15-1.el7_2.i686.rpm
postgresql-9.2.15-1.el7_2.x86_64.rpm
postgresql-contrib-9.2.15-1.el7_2.x86_64.rpm
postgresql-debuginfo-9.2.15-1.el7_2.i686.rpm
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-devel-9.2.15-1.el7_2.i686.rpm
postgresql-devel-9.2.15-1.el7_2.x86_64.rpm
postgresql-docs-9.2.15-1.el7_2.x86_64.rpm
postgresql-libs-9.2.15-1.el7_2.i686.rpm
postgresql-libs-9.2.15-1.el7_2.x86_64.rpm
postgresql-plperl-9.2.15-1.el7_2.x86_64.rpm
postgresql-plpython-9.2.15-1.el7_2.x86_64.rpm
postgresql-pltcl-9.2.15-1.el7_2.x86_64.rpm
postgresql-server-9.2.15-1.el7_2.x86_64.rpm
postgresql-test-9.2.15-1.el7_2.x86_64.rpm
postgresql-upgrade-9.2.15-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
postgresql-9.2.15-1.el7_2.src.rpm

x86_64:
postgresql-9.2.15-1.el7_2.x86_64.rpm
postgresql-debuginfo-9.2.15-1.el7_2.i686.rpm
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-libs-9.2.15-1.el7_2.i686.rpm
postgresql-libs-9.2.15-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
postgresql-9.2.15-1.el7_2.i686.rpm
postgresql-contrib-9.2.15-1.el7_2.x86_64.rpm
postgresql-debuginfo-9.2.15-1.el7_2.i686.rpm
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-devel-9.2.15-1.el7_2.i686.rpm
postgresql-devel-9.2.15-1.el7_2.x86_64.rpm
postgresql-docs-9.2.15-1.el7_2.x86_64.rpm
postgresql-plperl-9.2.15-1.el7_2.x86_64.rpm
postgresql-plpython-9.2.15-1.el7_2.x86_64.rpm
postgresql-pltcl-9.2.15-1.el7_2.x86_64.rpm
postgresql-server-9.2.15-1.el7_2.x86_64.rpm
postgresql-test-9.2.15-1.el7_2.x86_64.rpm
postgresql-upgrade-9.2.15-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
postgresql-9.2.15-1.el7_2.src.rpm

ppc64:
postgresql-9.2.15-1.el7_2.ppc.rpm
postgresql-9.2.15-1.el7_2.ppc64.rpm
postgresql-contrib-9.2.15-1.el7_2.ppc64.rpm
postgresql-debuginfo-9.2.15-1.el7_2.ppc.rpm
postgresql-debuginfo-9.2.15-1.el7_2.ppc64.rpm
postgresql-devel-9.2.15-1.el7_2.ppc.rpm
postgresql-devel-9.2.15-1.el7_2.ppc64.rpm
postgresql-docs-9.2.15-1.el7_2.ppc64.rpm
postgresql-libs-9.2.15-1.el7_2.ppc.rpm
postgresql-libs-9.2.15-1.el7_2.ppc64.rpm
postgresql-plperl-9.2.15-1.el7_2.ppc64.rpm
postgresql-plpython-9.2.15-1.el7_2.ppc64.rpm
postgresql-pltcl-9.2.15-1.el7_2.ppc64.rpm
postgresql-server-9.2.15-1.el7_2.ppc64.rpm
postgresql-test-9.2.15-1.el7_2.ppc64.rpm

ppc64le:
postgresql-9.2.15-1.el7_2.ppc64le.rpm
postgresql-contrib-9.2.15-1.el7_2.ppc64le.rpm
postgresql-debuginfo-9.2.15-1.el7_2.ppc64le.rpm
postgresql-devel-9.2.15-1.el7_2.ppc64le.rpm
postgresql-docs-9.2.15-1.el7_2.ppc64le.rpm
postgresql-libs-9.2.15-1.el7_2.ppc64le.rpm
postgresql-plperl-9.2.15-1.el7_2.ppc64le.rpm
postgresql-plpython-9.2.15-1.el7_2.ppc64le.rpm
postgresql-pltcl-9.2.15-1.el7_2.ppc64le.rpm
postgresql-server-9.2.15-1.el7_2.ppc64le.rpm
postgresql-test-9.2.15-1.el7_2.ppc64le.rpm

s390x:
postgresql-9.2.15-1.el7_2.s390.rpm
postgresql-9.2.15-1.el7_2.s390x.rpm
postgresql-contrib-9.2.15-1.el7_2.s390x.rpm
postgresql-debuginfo-9.2.15-1.el7_2.s390.rpm
postgresql-debuginfo-9.2.15-1.el7_2.s390x.rpm
postgresql-devel-9.2.15-1.el7_2.s390.rpm
postgresql-devel-9.2.15-1.el7_2.s390x.rpm
postgresql-docs-9.2.15-1.el7_2.s390x.rpm
postgresql-libs-9.2.15-1.el7_2.s390.rpm
postgresql-libs-9.2.15-1.el7_2.s390x.rpm
postgresql-plperl-9.2.15-1.el7_2.s390x.rpm
postgresql-plpython-9.2.15-1.el7_2.s390x.rpm
postgresql-pltcl-9.2.15-1.el7_2.s390x.rpm
postgresql-server-9.2.15-1.el7_2.s390x.rpm
postgresql-test-9.2.15-1.el7_2.s390x.rpm

x86_64:
postgresql-9.2.15-1.el7_2.i686.rpm
postgresql-9.2.15-1.el7_2.x86_64.rpm
postgresql-contrib-9.2.15-1.el7_2.x86_64.rpm
postgresql-debuginfo-9.2.15-1.el7_2.i686.rpm
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-devel-9.2.15-1.el7_2.i686.rpm
postgresql-devel-9.2.15-1.el7_2.x86_64.rpm
postgresql-docs-9.2.15-1.el7_2.x86_64.rpm
postgresql-libs-9.2.15-1.el7_2.i686.rpm
postgresql-libs-9.2.15-1.el7_2.x86_64.rpm
postgresql-plperl-9.2.15-1.el7_2.x86_64.rpm
postgresql-plpython-9.2.15-1.el7_2.x86_64.rpm
postgresql-pltcl-9.2.15-1.el7_2.x86_64.rpm
postgresql-server-9.2.15-1.el7_2.x86_64.rpm
postgresql-test-9.2.15-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
postgresql-debuginfo-9.2.15-1.el7_2.ppc64.rpm
postgresql-upgrade-9.2.15-1.el7_2.ppc64.rpm

ppc64le:
postgresql-debuginfo-9.2.15-1.el7_2.ppc64le.rpm
postgresql-upgrade-9.2.15-1.el7_2.ppc64le.rpm

s390x:
postgresql-debuginfo-9.2.15-1.el7_2.s390x.rpm
postgresql-upgrade-9.2.15-1.el7_2.s390x.rpm

x86_64:
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-upgrade-9.2.15-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
postgresql-9.2.15-1.el7_2.src.rpm

x86_64:
postgresql-9.2.15-1.el7_2.i686.rpm
postgresql-9.2.15-1.el7_2.x86_64.rpm
postgresql-contrib-9.2.15-1.el7_2.x86_64.rpm
postgresql-debuginfo-9.2.15-1.el7_2.i686.rpm
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-devel-9.2.15-1.el7_2.i686.rpm
postgresql-devel-9.2.15-1.el7_2.x86_64.rpm
postgresql-docs-9.2.15-1.el7_2.x86_64.rpm
postgresql-libs-9.2.15-1.el7_2.i686.rpm
postgresql-libs-9.2.15-1.el7_2.x86_64.rpm
postgresql-plperl-9.2.15-1.el7_2.x86_64.rpm
postgresql-plpython-9.2.15-1.el7_2.x86_64.rpm
postgresql-pltcl-9.2.15-1.el7_2.x86_64.rpm
postgresql-server-9.2.15-1.el7_2.x86_64.rpm
postgresql-test-9.2.15-1.el7_2.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
postgresql-debuginfo-9.2.15-1.el7_2.x86_64.rpm
postgresql-upgrade-9.2.15-1.el7_2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-0773
https://access.redhat.com/security/updates/classification/#important
http://www.postgresql.org/about/news/1644/
http://www.postgresql.org/docs/current/static/release-9-2-15.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFW10OtXlSAg2UNWIIRAtJ6AJ9IHgTHwJnOylXgvWWU85wBESnOswCePPwu
W4+fYNq8Ty6aCfNIjuEkwP8=
=y3lO
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC