USN-417-1: PostgreSQL vulnerabilities

6 February 2007

PostgreSQL vulnerabilities

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Details

Jeff Trout discovered that the PostgreSQL server did not sufficiently
check data types of SQL function arguments in some cases. An
authenticated attacker could exploit this to crash the database server
or read out arbitrary locations in the server's memory, which could
allow retrieving database content the attacker should not be able to
see. (CVE-2007-0555)

Jeff Trout reported that the query planner did not verify that a table
was still compatible with a previously made query plan. By using ALTER
COLUMN TYPE during query execution, an attacker could exploit this to
read out arbitrary locations in the server's memory, which could allow
retrieving database content the attacker should not be able to see.
(CVE-2007-0556)

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.10
  • postgresql-8.1 - 8.1.4-7ubuntu0.2
Ubuntu 6.06
  • postgresql-8.1 - 8.1.4-0ubuntu1.2
Ubuntu 5.10
  • postgresql-7.4 - 1:7.4.8-17ubuntu1.4
  • postgresql-8.0 - 8.0.3-15ubuntu2.3

In general, a standard system upgrade is sufficient to effect the
necessary changes.