Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2012:1036-01] Moderate: postgresql security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Moderate: postgresql security update

Advisory ID: RHSA-2012:1036-01

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1036.html

Issue date: 2012-06-25

CVE Names: CVE-2012-2143

=====================================================================

 

1. Summary:

 

Updated postgresql packages that fix one security issue are now available

for Red Hat Enterprise Linux 5.

 

The Red Hat Security Response Team has rated this update as having moderate

security impact. A Common Vulnerability Scoring System (CVSS) base score,

which gives a detailed severity rating, is available from the CVE link in

the References section.

 

2. Relevant releases/architectures:

 

RHEL Desktop Workstation (v. 5 client) - i386, x86_64

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64

 

3. Description:

 

PostgreSQL is an advanced object-relational database management system

(DBMS).

 

A flaw was found in the way the crypt() password hashing function from the

optional PostgreSQL pgcrypto contrib module performed password

transformation when used with the DES algorithm. If the password string to

be hashed contained the 0x80 byte value, the remainder of the string was

ignored when calculating the hash, significantly reducing the password

strength. This made brute-force guessing more efficient as the whole

password was not required to gain access to protected resources.

(CVE-2012-2143)

 

Note: With this update, the rest of the string is properly included in the

DES hash; therefore, any previously stored password values that are

affected by this issue will no longer match. In such cases, it will be

necessary for those stored password hashes to be updated.

 

Upstream acknowledges Rubin Xu and Joseph Bonneau as the original reporters

of this issue.

 

All PostgreSQL users are advised to upgrade to these updated packages,

which contain a backported patch to correct this issue. If the postgresql

service is running, it will be automatically restarted after installing

this update.

 

4. Solution:

 

Before applying this update, make sure all previously-released errata

relevant to your system have been applied.

 

This update is available via the Red Hat Network. Details on how to

use the Red Hat Network to apply this update are available at

https://access.redhat.com/knowledge/articles/11258

 

5. Bugs fixed (http://bugzilla.redhat.com/):

 

816956 - CVE-2012-2143 BSD crypt(): DES encrypted password weakness

 

6. Package List:

 

Red Hat Enterprise Linux Desktop (v. 5 client):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/postgresql-8.1.23-5.el5_8.src.rpm

 

i386:

postgresql-8.1.23-5.el5_8.i386.rpm

postgresql-contrib-8.1.23-5.el5_8.i386.rpm

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-docs-8.1.23-5.el5_8.i386.rpm

postgresql-libs-8.1.23-5.el5_8.i386.rpm

postgresql-python-8.1.23-5.el5_8.i386.rpm

postgresql-tcl-8.1.23-5.el5_8.i386.rpm

 

x86_64:

postgresql-8.1.23-5.el5_8.x86_64.rpm

postgresql-contrib-8.1.23-5.el5_8.x86_64.rpm

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-debuginfo-8.1.23-5.el5_8.x86_64.rpm

postgresql-docs-8.1.23-5.el5_8.x86_64.rpm

postgresql-libs-8.1.23-5.el5_8.i386.rpm

postgresql-libs-8.1.23-5.el5_8.x86_64.rpm

postgresql-python-8.1.23-5.el5_8.x86_64.rpm

postgresql-tcl-8.1.23-5.el5_8.x86_64.rpm

 

RHEL Desktop Workstation (v. 5 client):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/postgresql-8.1.23-5.el5_8.src.rpm

 

i386:

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-devel-8.1.23-5.el5_8.i386.rpm

postgresql-pl-8.1.23-5.el5_8.i386.rpm

postgresql-server-8.1.23-5.el5_8.i386.rpm

postgresql-test-8.1.23-5.el5_8.i386.rpm

 

x86_64:

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-debuginfo-8.1.23-5.el5_8.x86_64.rpm

postgresql-devel-8.1.23-5.el5_8.i386.rpm

postgresql-devel-8.1.23-5.el5_8.x86_64.rpm

postgresql-pl-8.1.23-5.el5_8.x86_64.rpm

postgresql-server-8.1.23-5.el5_8.x86_64.rpm

postgresql-test-8.1.23-5.el5_8.x86_64.rpm

 

Red Hat Enterprise Linux (v. 5 server):

 

Source:

ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/postgresql-8.1.23-5.el5_8.src.rpm

 

i386:

postgresql-8.1.23-5.el5_8.i386.rpm

postgresql-contrib-8.1.23-5.el5_8.i386.rpm

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-devel-8.1.23-5.el5_8.i386.rpm

postgresql-docs-8.1.23-5.el5_8.i386.rpm

postgresql-libs-8.1.23-5.el5_8.i386.rpm

postgresql-pl-8.1.23-5.el5_8.i386.rpm

postgresql-python-8.1.23-5.el5_8.i386.rpm

postgresql-server-8.1.23-5.el5_8.i386.rpm

postgresql-tcl-8.1.23-5.el5_8.i386.rpm

postgresql-test-8.1.23-5.el5_8.i386.rpm

 

ia64:

postgresql-8.1.23-5.el5_8.ia64.rpm

postgresql-contrib-8.1.23-5.el5_8.ia64.rpm

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-debuginfo-8.1.23-5.el5_8.ia64.rpm

postgresql-devel-8.1.23-5.el5_8.ia64.rpm

postgresql-docs-8.1.23-5.el5_8.ia64.rpm

postgresql-libs-8.1.23-5.el5_8.i386.rpm

postgresql-libs-8.1.23-5.el5_8.ia64.rpm

postgresql-pl-8.1.23-5.el5_8.ia64.rpm

postgresql-python-8.1.23-5.el5_8.ia64.rpm

postgresql-server-8.1.23-5.el5_8.ia64.rpm

postgresql-tcl-8.1.23-5.el5_8.ia64.rpm

postgresql-test-8.1.23-5.el5_8.ia64.rpm

 

ppc:

postgresql-8.1.23-5.el5_8.ppc.rpm

postgresql-8.1.23-5.el5_8.ppc64.rpm

postgresql-contrib-8.1.23-5.el5_8.ppc.rpm

postgresql-debuginfo-8.1.23-5.el5_8.ppc.rpm

postgresql-debuginfo-8.1.23-5.el5_8.ppc64.rpm

postgresql-devel-8.1.23-5.el5_8.ppc.rpm

postgresql-devel-8.1.23-5.el5_8.ppc64.rpm

postgresql-docs-8.1.23-5.el5_8.ppc.rpm

postgresql-libs-8.1.23-5.el5_8.ppc.rpm

postgresql-libs-8.1.23-5.el5_8.ppc64.rpm

postgresql-pl-8.1.23-5.el5_8.ppc.rpm

postgresql-python-8.1.23-5.el5_8.ppc.rpm

postgresql-server-8.1.23-5.el5_8.ppc.rpm

postgresql-tcl-8.1.23-5.el5_8.ppc.rpm

postgresql-test-8.1.23-5.el5_8.ppc.rpm

 

s390x:

postgresql-8.1.23-5.el5_8.s390x.rpm

postgresql-contrib-8.1.23-5.el5_8.s390x.rpm

postgresql-debuginfo-8.1.23-5.el5_8.s390.rpm

postgresql-debuginfo-8.1.23-5.el5_8.s390x.rpm

postgresql-devel-8.1.23-5.el5_8.s390.rpm

postgresql-devel-8.1.23-5.el5_8.s390x.rpm

postgresql-docs-8.1.23-5.el5_8.s390x.rpm

postgresql-libs-8.1.23-5.el5_8.s390.rpm

postgresql-libs-8.1.23-5.el5_8.s390x.rpm

postgresql-pl-8.1.23-5.el5_8.s390x.rpm

postgresql-python-8.1.23-5.el5_8.s390x.rpm

postgresql-server-8.1.23-5.el5_8.s390x.rpm

postgresql-tcl-8.1.23-5.el5_8.s390x.rpm

postgresql-test-8.1.23-5.el5_8.s390x.rpm

 

x86_64:

postgresql-8.1.23-5.el5_8.x86_64.rpm

postgresql-contrib-8.1.23-5.el5_8.x86_64.rpm

postgresql-debuginfo-8.1.23-5.el5_8.i386.rpm

postgresql-debuginfo-8.1.23-5.el5_8.x86_64.rpm

postgresql-devel-8.1.23-5.el5_8.i386.rpm

postgresql-devel-8.1.23-5.el5_8.x86_64.rpm

postgresql-docs-8.1.23-5.el5_8.x86_64.rpm

postgresql-libs-8.1.23-5.el5_8.i386.rpm

postgresql-libs-8.1.23-5.el5_8.x86_64.rpm

postgresql-pl-8.1.23-5.el5_8.x86_64.rpm

postgresql-python-8.1.23-5.el5_8.x86_64.rpm

postgresql-server-8.1.23-5.el5_8.x86_64.rpm

postgresql-tcl-8.1.23-5.el5_8.x86_64.rpm

postgresql-test-8.1.23-5.el5_8.x86_64.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://access.redhat.com/security/team/key/#package

 

7. References:

 

https://www.redhat.com/security/data/cve/CVE-2012-2143.html

https://access.redhat.com/security/updates/classification/#moderate

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://access.redhat.com/security/team/contact/

 

Copyright 2012 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.4 (GNU/Linux)

 

iD8DBQFP6KshXlSAg2UNWIIRAnNfAJsGS/3GOt6zxCmzDHLKSXgExHfgHACgoyN5

9ptMbgERL6EY0yPz2nCmCmE=

=scBF

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×