lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 21 Apr 2005 10:20:28 -0400
From: Peachtree Linux Security Team <security@...chtree.burdell.org>
To: bugtraq@...urityfocus.com
Subject: [PLSN-0004] - Buffer overflow in PostgreSQL

---------------------------------------------------------------------------
Peachtree Linux Security Notice PLSN-0004
April 20, 2005

Buffer overflow in PL/PGSQL parser allowing database users to run arbitrary
code as pgsql user
CAN-2005-0245, CAN-2005-0247
---------------------------------------------------------------------------

The following Peachtree Linux releases are affected:

   Peachtree Linux release 1 ("Atlanta")

Description:

   CAN-2005-0245, CAN-2005-0247: Two buffer overflow vulnerabilities are
   present in the PL/PGSL parser gram.y which allow anyone with the ability
   to run SQL statements to execute arbitrary code as the pgsql user.

Packages:

   alpha
      1e36e9d2d64e9ff7a85c99a539ab1f61  postgresql-7.4.7.alpha.dist

   i386
      430f9cc3b162bba75bb970e288c80dac  postgresql-7.4.7.i686.dist

   ppc
      9e805d9a73becf8da6910ac493bb37a1  postgresql-7.4.7.ppc.dist

Solution:

   Download the appropriate package for your release of Peachtree linux.
   Upgrade your system to the new package:

      distadd -u packagename

   Where package name is the name of the package file from the list above.

   After installation of the new package, restart any running postgresql
   services.  This new version of postgresql does not change the layout of
   the database on the filesystem, and therefore does not require a
   dump/restore.

-- 
Peachtree Linux Security Team
http://peachtree.burdell.org/

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ