Scientific Linux Security Update : postgresql84 on SL5.x i386/x86_64

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

A flaw was found in the way PostgreSQL enforced permission checks on
scripts written in PL/Perl. If the PL/Perl procedural language was
registered on a particular database, an authenticated database user
running a specially crafted PL/Perl script could use this flaw to
bypass intended PL/Perl trusted mode restrictions, allowing them to
run arbitrary Perl scripts with the privileges of the database server.
(CVE-2010-1169)

A flaw was found in the way PostgreSQL enforced permission checks on
scripts written in PL/Tcl. If the PL/Tcl procedural language was
registered on a particular database, an authenticated database user
running aspecially crafted PL/Tcl script could use this flaw to bypass
intended PL/Tcl trusted mode restrictions, allowing them to run
arbitrary Tcl scripts with the privileges of the database server.
(CVE-2010-1170)

If the postgresql service is running, it will be automatically
restarted after installing this update.

NOTE1: postgresql84 and postgresql packages cannot be installed
concurrently on the same system, with the exception that the
postgresql-libs package can remain in place in parallel with
postgresql84. The postgresql-libs package contains client-side library
code to which existing applications may be linked. These libraries
will still work with the newer server.

NOTE2: As 8.4.x also has on-disk data format differences from 8.1.x,
it is not possible to upgrade an existing 8.1.x PostgreSQL database to
8.4.x merely by replacing the packages. Instead, first dump the
contents of the existing database using the pg_dumpall command, then
shut down the old server and remove the database files (under
/var/lib/pgsql/data). Next, remove the old packages and install the
new ones
start the new server
and finally restore the data from the
pg_dumpall output.

See also :

http://www.nessus.org/u?66bbd078

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60794 ()

Bugtraq ID:

CVE ID: CVE-2010-1169
CVE-2010-1170