USN-417-1: PostgreSQL vulnerabilities

Ubuntu Security Notice USN-417-1

5th February, 2007

postgresql-7.4/-8.0/-8.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.10
  • Ubuntu 6.06 LTS
  • Ubuntu 5.10

Details

Jeff Trout discovered that the PostgreSQL server did not sufficiently
check data types of SQL function arguments in some cases. An
authenticated attacker could exploit this to crash the database server
or read out arbitrary locations in the server's memory, which could
allow retrieving database content the attacker should not be able to
see. (CVE-2007-0555)

Jeff Trout reported that the query planner did not verify that a table
was still compatible with a previously made query plan. By using ALTER
COLUMN TYPE during query execution, an attacker could exploit this to
read out arbitrary locations in the server's memory, which could allow
retrieving database content the attacker should not be able to see.
(CVE-2007-0556)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 6.10:
postgresql-8.1 8.1.4-7ubuntu0.2
Ubuntu 6.06 LTS:
postgresql-8.1 8.1.4-0ubuntu1.2
Ubuntu 5.10:
postgresql-7.4 1:7.4.8-17ubuntu1.4
postgresql-8.0 8.0.3-15ubuntu2.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

CVE-2007-0555, CVE-2007-0556