Scientific Linux Security Update : postgresql84 on SL5.x i386/x86_64

high Nessus Plugin ID 60794
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A flaw was found in the way PostgreSQL enforced permission checks on scripts written in PL/Perl. If the PL/Perl procedural language was registered on a particular database, an authenticated database user running a specially crafted PL/Perl script could use this flaw to bypass intended PL/Perl trusted mode restrictions, allowing them to run arbitrary Perl scripts with the privileges of the database server.
(CVE-2010-1169)

A flaw was found in the way PostgreSQL enforced permission checks on scripts written in PL/Tcl. If the PL/Tcl procedural language was registered on a particular database, an authenticated database user running aspecially crafted PL/Tcl script could use this flaw to bypass intended PL/Tcl trusted mode restrictions, allowing them to run arbitrary Tcl scripts with the privileges of the database server.
(CVE-2010-1170)

If the postgresql service is running, it will be automatically restarted after installing this update.

NOTE1: postgresql84 and postgresql packages cannot be installed concurrently on the same system, with the exception that the postgresql-libs package can remain in place in parallel with postgresql84. The postgresql-libs package contains client-side library code to which existing applications may be linked. These libraries will still work with the newer server.

NOTE2: As 8.4.x also has on-disk data format differences from 8.1.x, it is not possible to upgrade an existing 8.1.x PostgreSQL database to 8.4.x merely by replacing the packages. Instead, first dump the contents of the existing database using the pg_dumpall command, then shut down the old server and remove the database files (under /var/lib/pgsql/data). Next, remove the old packages and install the new ones; start the new server; and finally restore the data from the pg_dumpall output.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?bf93e51b

Plugin Details

Severity: High

ID: 60794

File Name: sl_20100519_postgresql84_on_SL5_x.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.5

Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 5/19/2010

Reference Information

CVE: CVE-2010-1169, CVE-2010-1170