Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Ubuntu Update for postgresql-8.1, postgresql-8.2 vulnerability USN-454-1

Information

Severity

Severity

Medium

Family

Family

Ubuntu Local Security Checks

CVSSv2 Base

CVSSv2 Base

6.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

6 years ago

Summary

Ubuntu Update for Linux kernel vulnerabilities USN-454-1

Insight

Insight

PostgreSQL did not handle the &quot search_path&quot configuration option in a secure way for functions declared as &quot SECURITY DEFINER&quot . Previously, an attacker could override functions and operators used by the security definer function to execute arbitrary SQL commands with the privileges of the user who created the security definer function. The updated version does not search the temporary table schema for functions and operators any more. Similarly, an attacker could put forged tables into the temporary table schema to trick the security definer function into using attacker defined data for processing. This was possible because the temporary schema was always implicitly searched first before all other entries in &quot search_path&quot . The updated version now supports explicit placement of the temporary schema. Please see the HTML documentation or the manual page for &quot CREATE FUNCTION&quot for details and an example how to write security definer functions in a secure way.

Affected Software

Affected Software

postgresql-8.1, postgresql-8.2 vulnerability on Ubuntu 6.06 LTS , Ubuntu 6.10 , Ubuntu 7.04

Solution

Solution

Please Install the Updated Packages.

Common Vulnerabilities and Exposures (CVE)