RHSA-2003_001
Vulnerability from csaf_redhat - Published: 2003-01-14 22:22 - Updated: 2024-11-21 22:35Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.
Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.
Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability "in handling long datetime input."
Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated PostgreSQL packages are available for Red Hat Linux 7.3 and 8.0.\nThese packages correct several security and other bugs. A separate\nadvisory deals with updated PostgreSQL packages for Red Hat Linux 6.2, 7,\n7.1, and 7.2.",
"title": "Topic"
},
{
"category": "general",
"text": "PostgreSQL is an advanced Object-Relational database management system. \nRed Hat Linux 7.3 shipped with PostgreSQL version 7.2.1. Red Hat Linux 8.0\nshipped with PostgreSQL version 7.2.2.\n\nPostgreSQL versions 7.2.1 and 7.2.2 contain a serious issue with the VACUUM\ncommand when it is run by a non-superuser. It is possible for the system\nto prematurely remove old transaction log data (pg_clog files), which can\nresult in unrecoverable data loss.\n\nA number of minor security issues affect the PostgreSQL 7.2.1 packages\nshipped with Red Hat Linux 7.3 only:\n\n1. Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of\nservice and possibly execute arbitrary code via long arguments to the lpad\nor rpad functions. CAN-2002-0972\n \n2. Buffer overflow in the cash_words() function allows local users to cause\na denial of service and possibly execute arbitrary code via a malformed\nargument. CAN-2002-1397\n\n3. Buffer overflow in the date parser allows attackers to cause a denial of\nservice and possibly execute arbitrary code via a long date string, also\nknown as a vulnerability \"in handling long datetime input.\" CAN-2002-1398\n\n4. Heap-based buffer overflow in the repeat() function allows attackers to\nexecute arbitrary code by causing repeat() to generate a large string.\nCAN-2002-1400\n\n5. Buffer overflows in the TZ and SET TIME ZONE enivronment variables allow\nlocal users to cause a denial of service and possibly execute arbitrary\ncode. CAN-2002-1402\n\nAdditionally, buffer overflows in circle_poly, path_encode and path_add\nallow attackers to cause a denial of service and possibly execute arbitrary\ncode. Note that these overflows have been fixed in our erratum packages and\nin PostgreSQL CVS, but are not fixed in the released versions of PostgreSQL\nversion 7.2.3. CAN-2002-1401\n\nThe above vulnerabilities are only critical on open or shared systems\nbecause connecting to the database is required before the vulnerabilities\ncan be exploited. \n\nThis update also contains fixes for several other PostgreSQL bugs,\nincluding handling of pre-1970 date values in newer versions of glibc,\npossible server shutdown hangs, spinlock hangs on SMP PPC machines, and\npg_dump improperly dumping with the FULL JOIN USING clauses.\n\nAll users of PostgreSQL should upgrade to these errata packages containing\nPostgreSQL 7.2.3 with additional patches to correct all these issues. Note\nthat running initdb is not necessary when upgrading from 7.2.1 or 7.2.2 to\nthe packages contained in this errata.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2003:001",
"url": "https://access.redhat.com/errata/RHSA-2003:001"
},
{
"category": "external",
"summary": "http://www3.ca.postgresql.org/users-lounge/docs/7.3/postgres/release-7-2-3.html",
"url": "http://www3.ca.postgresql.org/users-lounge/docs/7.3/postgres/release-7-2-3.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_001.json"
}
],
"title": "Red Hat Security Advisory: : Updated PostgreSQL packages fix security issues and bugs",
"tracking": {
"current_release_date": "2024-11-21T22:35:31+00:00",
"generator": {
"date": "2024-11-21T22:35:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2003:001",
"initial_release_date": "2003-01-14T22:22:00+00:00",
"revision_history": [
{
"date": "2003-01-14T22:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2003-02-07T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-21T22:35:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Linux 7.3",
"product": {
"name": "Red Hat Linux 7.3",
"product_id": "Red Hat Linux 7.3",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:linux:7.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux 8.0",
"product": {
"name": "Red Hat Linux 8.0",
"product_id": "Red Hat Linux 8.0",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:linux:8.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2002-0972",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616832"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-0972"
},
{
"category": "external",
"summary": "RHBZ#1616832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616832"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-0972",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0972"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-0972"
}
],
"release_date": "2002-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2003-01-14T22:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2003:001"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2002-1397",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616910"
}
],
"notes": [
{
"category": "description",
"text": "Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-1397"
},
{
"category": "external",
"summary": "RHBZ#1616910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616910"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-1397",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-1397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1397"
}
],
"release_date": "2002-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2003-01-14T22:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2003:001"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2002-1398",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616911"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability \"in handling long datetime input.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-1398"
},
{
"category": "external",
"summary": "RHBZ#1616911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-1398",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-1398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1398"
}
],
"release_date": "2002-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2003-01-14T22:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2003:001"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2002-1400",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616912"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-1400"
},
{
"category": "external",
"summary": "RHBZ#1616912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616912"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-1400",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-1400"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1400"
}
],
"release_date": "2002-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2003-01-14T22:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2003:001"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2002-1401",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616913"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-1401"
},
{
"category": "external",
"summary": "RHBZ#1616913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-1401",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-1401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1401"
}
],
"release_date": "2002-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2003-01-14T22:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2003:001"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2002-1402",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1616914"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2002-1402"
},
{
"category": "external",
"summary": "RHBZ#1616914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2002-1402",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-1402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1402"
}
],
"release_date": "2002-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2003-01-14T22:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Linux 7.3",
"Red Hat Linux 8.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2003:001"
}
],
"title": "security flaw"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.