Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Ubuntu Update for postgresql-8.1, postgresql-8.2 vulnerability USN-454-1
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Ubuntu Update for Linux kernel vulnerabilities USN-454-1
Insight
Insight
PostgreSQL did not handle the " search_path" configuration option in a secure way for functions declared as " SECURITY DEFINER" . Previously, an attacker could override functions and operators used by the security definer function to execute arbitrary SQL commands with the privileges of the user who created the security definer function. The updated version does not search the temporary table schema for functions and operators any more. Similarly, an attacker could put forged tables into the temporary table schema to trick the security definer function into using attacker defined data for processing. This was possible because the temporary schema was always implicitly searched first before all other entries in " search_path" . The updated version now supports explicit placement of the temporary schema. Please see the HTML documentation or the manual page for " CREATE FUNCTION" for details and an example how to write security definer functions in a secure way.
Affected Software
Affected Software
postgresql-8.1, postgresql-8.2 vulnerability on Ubuntu 6.06 LTS , Ubuntu 6.10 , Ubuntu 7.04
Solution
Solution
Please Install the Updated Packages.