From $URL : Description Sumit Soni has discovered a vulnerability in PostgreSQL, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due an input validation error within the "enum_recv()" function (backend/utils/adt/enum.c) and can be exploited to crash the server via a specially crafted SQL query. The vulnerability is confirmed in version 9.2.2-1 64-bit. Prior versions may also be affected. Solution Update to version 8.3.23, 8.4.16, 9.0.12, 9.1.8, or 9.2.3. Provided and/or discovered by Sumit Soni via Secunia.
Stabilization targets: dev-db/postgresql-{docs,base,server}-{8.3.23,8.4.16,9.0.12,9.1.8,9.2.3} *postgresql-docs-9.2.3 (08 Feb 2013) *postgresql-docs-9.1.8 (08 Feb 2013) *postgresql-docs-9.0.12 (08 Feb 2013) *postgresql-docs-8.4.16 (08 Feb 2013) *postgresql-docs-8.3.23 (08 Feb 2013) 08 Feb 2013; Aaron W. Swenson <titanofold@gentoo.org> +postgresql-docs-8.3.23.ebuild, +postgresql-docs-8.4.16.ebuild, +postgresql-docs-9.0.12.ebuild, +postgresql-docs-9.1.8.ebuild, +postgresql-docs-9.2.3.ebuild: Security bump. (Bug 456080) *postgresql-base-9.2.3 (08 Feb 2013) *postgresql-base-9.1.8 (08 Feb 2013) *postgresql-base-9.0.12 (08 Feb 2013) *postgresql-base-8.4.16 (08 Feb 2013) *postgresql-base-8.3.23 (08 Feb 2013) 08 Feb 2013; Aaron W. Swenson <titanofold@gentoo.org> +postgresql-base-8.3.23.ebuild, +postgresql-base-8.4.16.ebuild, +postgresql-base-9.0.12.ebuild, +postgresql-base-9.1.8.ebuild, +postgresql-base-9.2.3.ebuild, postgresql-base-9999.ebuild: Append ${SLOT} to PAM service name; each slot now has its own PAM service file. (Bug 443113) Security bump. (Bug 456080) *postgresql-server-9.2.3 (08 Feb 2013) *postgresql-server-9.1.8 (08 Feb 2013) *postgresql-server-9.0.12 (08 Feb 2013) *postgresql-server-8.4.16 (08 Feb 2013) *postgresql-server-8.3.23 (08 Feb 2013) 08 Feb 2013; Aaron W. Swenson <titanofold@gentoo.org> +postgresql-server-8.3.23.ebuild, +postgresql-server-8.4.16.ebuild, +postgresql-server-9.0.12.ebuild, +postgresql-server-9.1.8.ebuild, +postgresql-server-9.2.3.ebuild, postgresql-server-9999.ebuild: Added kerberos USE flag. (Bug 427948) Use python-single-r1.eclass to build PL/Python against the Python of the users choosing. (Bug 427954) 'use' instead of 'need' logger in /etc/init.d/postgresql-${SLOT}. (Bug 435280) Default to sane character encoding default with --encoding=UTF-8 in /etc/conf.d/postgresql-${SLOT}. (Bug 440258) Append ${SLOT} to PAM service name; each slot now has its own PAM service file. (Bug 443113) Security bump. (Bug 456080)
Per Agostino's request, a full, explicit list for the stabilization targets: dev-db/postgresql-docs-9.2.3 dev-db/postgresql-docs-9.1.8 dev-db/postgresql-docs-9.0.12 dev-db/postgresql-docs-8.4.16 dev-db/postgresql-docs-8.3.23 dev-db/postgresql-base-9.2.3 dev-db/postgresql-base-9.1.8 dev-db/postgresql-base-9.0.12 dev-db/postgresql-base-8.4.16 dev-db/postgresql-base-8.3.23 dev-db/postgresql-server-9.2.3 dev-db/postgresql-server-9.1.8 dev-db/postgresql-server-9.0.12 dev-db/postgresql-server-8.4.16 dev-db/postgresql-server-8.3.23
dev-db/postgresql-base-9.2.3 used the wrong patch set. So, it's been replaced. Here's the updated list: =dev-db/postgresql-docs-9.2.3 =dev-db/postgresql-docs-9.1.8 =dev-db/postgresql-docs-9.0.12 =dev-db/postgresql-docs-8.4.16 =dev-db/postgresql-docs-8.3.23 =dev-db/postgresql-base-9.2.3-r1 =dev-db/postgresql-base-9.1.8 =dev-db/postgresql-base-9.0.12 =dev-db/postgresql-base-8.4.16 =dev-db/postgresql-base-8.3.23 =dev-db/postgresql-server-9.2.3 =dev-db/postgresql-server-9.1.8 =dev-db/postgresql-server-9.0.12 =dev-db/postgresql-server-8.4.16 =dev-db/postgresql-server-8.3.23
*** Bug 456480 has been marked as a duplicate of this bug. ***
amd64 stable
x86 stable
ppc stable
ppc64 stable
ia64 stable
alpha stable
arm stable
s390 stable
sparc stable
hppa stable
I had to fix bug 456964 so that the PGSQL_PAM_SERVICE would be updated properly. With Ago's permission, I did a revbump preserving stablization. Updated list: =dev-db/postgresql-docs-9.2.3 =dev-db/postgresql-docs-9.1.8 =dev-db/postgresql-docs-9.0.12 =dev-db/postgresql-docs-8.4.16 =dev-db/postgresql-docs-8.3.23 =dev-db/postgresql-base-9.2.3-r1 =dev-db/postgresql-base-9.1.8 =dev-db/postgresql-base-9.0.12 =dev-db/postgresql-base-8.4.16 =dev-db/postgresql-base-8.3.23 =dev-db/postgresql-server-9.2.3-r1 =dev-db/postgresql-server-9.1.8-r1 =dev-db/postgresql-server-9.0.12-r1 =dev-db/postgresql-server-8.4.16-r1 =dev-db/postgresql-server-8.3.23-r1
sh stable
CVE-2013-0255 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0255): PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
Ready for vote, I vote YES.
GLSA vote: yes. GLSA drafted.
This issue was resolved and addressed in GLSA 201408-15 at http://security.gentoo.org/glsa/glsa-201408-15.xml by GLSA coordinator Kristian Fiskerstrand (K_F).