[HACKERS] Security bugs

2006-07-26 Thread Dhanaraj M


I heard that 2 security bugs were fixed in 8.1.4.
Since I like to upgrade from 8.1.3, I like to know the bugs.
Can somebody give the description of those bugs?

Thanks
Dhanaraj

---(end of broadcast)---
TIP 9: In versions below 8.0, the planner will ignore your desire to
  choose an index scan if your joining column's datatypes do not
  match


Re: [HACKERS] Security bugs

2006-07-26 Thread Michael Glaesemann


On Jul 26, 2006, at 19:17 , Dhanaraj M wrote:


I heard that 2 security bugs were fixed in 8.1.4.
Since I like to upgrade from 8.1.3, I like to know the bugs.
Can somebody give the description of those bugs?


Following the Security link from the Postgres home page:

http://www.postgresql.org/support/security.html

You'll see a list of all security issues. The top two (CVE-2006-2314  
and CVE-2006-2313) are probably the two you heard about.


Hope this helps.

Michael Glaesemann
grzm seespotcode net




---(end of broadcast)---
TIP 3: Have you checked our extensive FAQ?

  http://www.postgresql.org/docs/faq


Re: [HACKERS] Security bugs

2006-07-26 Thread Andrew Dunstan

Dhanaraj M wrote:


I heard that 2 security bugs were fixed in 8.1.4.
Since I like to upgrade from 8.1.3, I like to know the bugs.
Can somebody give the description of those bugs?



There is a list of the changes in each release in the Release Notes. In 
this case, you want: 
http://www.postgresql.org/docs/current/static/release.html#RELEASE-8-1-4


For this particular case there are also other docs: see 
http://www.postgresql.org/docs/techdocs.48


Essentially the security issues are related to uses of multi-byte encodings.

cheers

andrew



---(end of broadcast)---
TIP 5: don't forget to increase your free space map settings


[HACKERS] Security bugs in tsearch2

2005-01-29 Thread Tom Lane
I just noticed that all of tsearch2's dict init routines are declared
like this:

CREATE FUNCTION dex_init(text)
returns internal
as 'MODULE_PATHNAME' 
language 'C';

This is really unacceptable, because it breaks the type safety of the
internal pseudotype.  I quote from datatype.sgml:

The internal pseudo-type is used to declare functions
that are meant only to be called internally by the database
system, and not by direct invocation in a SQL
query.  If a function has at least one internal-type
argument then it cannot be called from SQL.  To
preserve the type safety of this restriction it is important to
follow this coding rule: do not create any function that is
declared to return internal unless it has at least one
internal argument.

In a database with these functions installed, it will be trivial for
anyone to crash the backend (and perhaps do worse things) since he can
pass the result of dex_init to any function taking an internal argument
--- almost none of which are expecting a dict data structure.

Please change these at once.  The best solution might be to declare
an actual dict datatype for these functions to return.

Another security issue is that these functions can be used to read any
file that the backend can read.  I'm not sure at the moment whether a
bad guy could do anything useful with the result (are the contents of
stoplists exposed anywhere?) but it seems fairly dangerous to allow
arbitrary pathnames in the argument.

A possible short-term solution is to revoke public execute rights on
these functions, so that only superusers can call them.

regards, tom lane

---(end of broadcast)---
TIP 4: Don't 'kill -9' the postmaster