Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 16 Sep 2009 21:34:17 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security <oss-security@...ts.openwall.com>,
        oss-security <oss-security@...ts.openwall.com>
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- PostgreSQL


======================================================
Name: CVE-2009-3229
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229
Reference: CONFIRM:http://www.postgresql.org/docs/8.3/static/release-8-3-8.html
Reference: CONFIRM:http://www.postgresql.org/support/security.html
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=522092
Reference: FEDORA:FEDORA-2009-9473
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html
Reference: FEDORA:FEDORA-2009-9474
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html
Reference: BID:36314
Reference: URL:http://www.securityfocus.com/bid/36314
Reference: SECUNIA:36660
Reference: URL:http://secunia.com/advisories/36660
Reference: SECUNIA:36727
Reference: URL:http://secunia.com/advisories/36727

The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before
8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to
cause a denial of service (backend shutdown) by "re-LOAD-ing"
libraries from a certain plugins directory.


======================================================
Name: CVE-2009-3230
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230
Reference: MLIST:[pgsql-www] 20090909 Re: Incorrect CVE reference on security page
Reference: URL:http://archives.postgresql.org/pgsql-www/2009-09/msg00024.php
Reference: CONFIRM:http://www.postgresql.org/docs/8.3/static/release-8-3-8.html
Reference: CONFIRM:http://www.postgresql.org/support/security.html
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=522085
Reference: FEDORA:FEDORA-2009-9473
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html
Reference: FEDORA:FEDORA-2009-9474
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html
Reference: BID:36314
Reference: URL:http://www.securityfocus.com/bid/36314
Reference: SECUNIA:36660
Reference: URL:http://secunia.com/advisories/36660
Reference: SECUNIA:36695
Reference: URL:http://secunia.com/advisories/36695
Reference: SECUNIA:36727
Reference: URL:http://secunia.com/advisories/36727
Reference: VUPEN:ADV-2009-2602
Reference: URL:http://www.vupen.com/english/advisories/2009/2602

The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before
8.3.8, 8.2 before 8.2.14, 8.1 before 8.1.18, 8.0 before 8.0.22, and
7.4 before 7.4.26 does not use the appropriate privileges for the (1)
RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, which
allows remote authenticated users to gain privileges.  NOTE: this is
due to an incomplete fix for CVE-2007-6600.


======================================================
Name: CVE-2009-3231
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231
Reference: CONFIRM:http://www.postgresql.org/docs/8.3/static/release-8-3-8.html
Reference: CONFIRM:http://www.postgresql.org/support/security.html
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=522084
Reference: FEDORA:FEDORA-2009-9473
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html
Reference: FEDORA:FEDORA-2009-9474
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html
Reference: BID:36314
Reference: URL:http://www.securityfocus.com/bid/36314
Reference: SECUNIA:36660
Reference: URL:http://secunia.com/advisories/36660
Reference: SECUNIA:36727
Reference: URL:http://secunia.com/advisories/36727

The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2
before 8.2.14, when using LDAP authentication with anonymous binds,
allows remote attackers to bypass authentication via an empty
password.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.