Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70785
Category:Gentoo Local Security Checks
Title:Gentoo Security Advisory GLSA 201110-22 (postgresql-server postgresql-base)
Summary:The remote host is missing updates announced in;advisory GLSA 201110-22.
Description:Summary:
The remote host is missing updates announced in
advisory GLSA 201110-22.

Vulnerability Insight:
Multiple vulnerabilities in the PostgreSQL server and client allow
remote attacker to conduct several attacks, including the execution of
arbitrary code and Denial of Service.

Solution:
All PostgreSQL 8.2 users should upgrade to the latest 8.2 base version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-base-8.2.22:8.2'


All PostgreSQL 8.3 users should upgrade to the latest 8.3 base version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-base-8.3.16:8.3'


All PostgreSQL 8.4 users should upgrade to the latest 8.4 base version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-base-8.4.9:8.4'


All PostgreSQL 9.0 users should upgrade to the latest 9.0 base version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-base-9.0.5:9.0'


All PostgreSQL 8.2 server users should upgrade to the latest 8.2 server
version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-server-8.2.22:8.2'


All PostgreSQL 8.3 server users should upgrade to the latest 8.3 server
version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-server-8.3.16:8.3'


All PostgreSQL 8.4 server users should upgrade to the latest 8.4 server
version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-server-8.4.9:8.4'


All PostgreSQL 9.0 server users should upgrade to the latest 9.0 server
version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-db/postgresql-server-9.0.5:9.0'


The old unsplit PostgreSQL packages have been removed from portage.
Users still using them are urged to migrate to the new PostgreSQL
packages as stated above and to remove the old package:

# emerge --unmerge 'dev-db/postgresql'

CVSS Score:
8.5

CVSS Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0922
BugTraq ID: 34090
http://www.securityfocus.com/bid/34090
Bugtraq: 20090519 rPSA-2009-0086-1 postgresql postgresql-contrib postgresql-server (Google Search)
http://www.securityfocus.com/archive/1/503598/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00810.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00843.html
HPdes Security Advisory: HPSBMU02781
http://marc.info/?l=bugtraq&m=134124585221119&w=2
HPdes Security Advisory: SSRT100617
http://www.mandriva.com/security/advisories?name=MDVSA-2009:079
http://www.openwall.com/lists/oss-security/2009/03/11/4
http://archives.postgresql.org/pgsql-bugs/2009-02/msg00172.php
http://archives.postgresql.org//pgsql-bugs/2009-02/msg00176.php
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10874
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6252
http://www.redhat.com/support/errata/RHSA-2009-1067.html
http://www.securitytracker.com/id?1021860
http://secunia.com/advisories/34453
http://secunia.com/advisories/35100
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020455.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-258808-1
SuSE Security Announcement: SUSE-SR:2009:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://www.vupen.com/english/advisories/2009/0767
http://www.vupen.com/english/advisories/2009/1316
Common Vulnerability Exposure (CVE) ID: CVE-2009-3229
BugTraq ID: 36314
http://www.securityfocus.com/bid/36314
Bugtraq: 20100307 rPSA-2010-0012-1 postgresql postgresql-contrib postgresql-server (Google Search)
http://www.securityfocus.com/archive/1/509917/100/0/threaded
Debian Security Information: DSA-1900 (Google Search)
http://www.us.debian.org/security/2009/dsa-1900
https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html
https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html
http://secunia.com/advisories/36660
http://secunia.com/advisories/36727
http://secunia.com/advisories/36800
http://secunia.com/advisories/36837
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270408-1
SuSE Security Announcement: SUSE-SR:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
SuSE Security Announcement: SUSE-SR:2009:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://www.ubuntu.com/usn/usn-834-1
Common Vulnerability Exposure (CVE) ID: CVE-2009-3230
http://archives.postgresql.org/pgsql-www/2009-09/msg00024.php
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10166
http://secunia.com/advisories/36695
http://www.vupen.com/english/advisories/2009/2602
Common Vulnerability Exposure (CVE) ID: CVE-2009-3231
Common Vulnerability Exposure (CVE) ID: CVE-2009-4034
1023325
http://www.securitytracker.com/id?1023325
20100307 rPSA-2010-0012-1 postgresql postgresql-contrib postgresql-server
37334
http://www.securityfocus.com/bid/37334
37663
http://secunia.com/advisories/37663
61038
http://osvdb.org/61038
ADV-2009-3519
http://www.vupen.com/english/advisories/2009/3519
FEDORA-2009-13363
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01035.html
FEDORA-2009-13381
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01056.html
HPSBMU02781
MDVSA-2009:333
http://www.mandriva.com/security/advisories?name=MDVSA-2009:333
SSRT100617
SUSE-SR:2010:001
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html
http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0012
http://www.postgresql.org/docs/current/static/release-7-4-27.html
http://www.postgresql.org/docs/current/static/release-8-0-23.html
http://www.postgresql.org/docs/current/static/release-8-1-19.html
http://www.postgresql.org/docs/current/static/release-8-2-15.html
http://www.postgresql.org/docs/current/static/release-8-3-9.html
http://www.postgresql.org/docs/current/static/release-8-4-2.html
http://www.postgresql.org/support/security.html
Common Vulnerability Exposure (CVE) ID: CVE-2009-4136
1023326
http://www.securitytracker.com/id?1023326
37333
http://www.securityfocus.com/bid/37333
39820
http://secunia.com/advisories/39820
61039
http://osvdb.org/61039
ADV-2010-1197
http://www.vupen.com/english/advisories/2010/1197
RHSA-2010:0427
http://www.redhat.com/support/errata/RHSA-2010-0427.html
RHSA-2010:0428
http://www.redhat.com/support/errata/RHSA-2010-0428.html
RHSA-2010:0429
http://www.redhat.com/support/errata/RHSA-2010-0429.html
https://bugzilla.redhat.com/show_bug.cgi?id=546321
oval:org.mitre.oval:def:9358
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9358
Common Vulnerability Exposure (CVE) ID: CVE-2010-0442
1023510
http://securitytracker.com/id?1023510
37973
http://www.securityfocus.com/bid/37973
39566
http://secunia.com/advisories/39566
39939
http://secunia.com/advisories/39939
ADV-2010-1022
http://www.vupen.com/english/advisories/2010/1022
ADV-2010-1207
http://www.vupen.com/english/advisories/2010/1207
ADV-2010-1221
http://www.vupen.com/english/advisories/2010/1221
DSA-2051
http://www.debian.org/security/2010/dsa-2051
MDVSA-2010:103
http://www.mandriva.com/security/advisories?name=MDVSA-2010:103
USN-933-1
http://ubuntu.com/usn/usn-933-1
[oss-security] 20100127 Re: CVE id request: postgresql bitsubstr overflow
http://www.openwall.com/lists/oss-security/2010/01/27/5
[pgsql-committers] 20100107 pgsql: Make bit/varbit substring() treat any negative length as meaning
http://archives.postgresql.org/pgsql-committers/2010-01/msg00125.php
[pgsql-hackers] 20100107 Re: Patch: Allow substring/replace() to get/set bit values
http://archives.postgresql.org/pgsql-hackers/2010-01/msg00634.php
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567058
http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commit%3Bh=75dea10196c31d98d98c0bafeeb576ae99c09b12
http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commit%3Bh=b15087cb39ca9e4bde3c8920fcee3741045d2b83
http://intevydis.blogspot.com/2010/01/postgresql-8023-bitsubstr-overflow.html
https://bugzilla.redhat.com/show_bug.cgi?id=559194
https://bugzilla.redhat.com/show_bug.cgi?id=559259
oval:org.mitre.oval:def:9720
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9720
postgresql-substring-bo(55902)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55902
Common Vulnerability Exposure (CVE) ID: CVE-2010-0733
38619
http://www.securityfocus.com/bid/38619
SUSE-SR:2010:014
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
[oss-security] 20100309 CVE Request: postgresql integer overflow in hash table size calculation
http://www.openwall.com/lists/oss-security/2010/03/09/2
[oss-security] 20100316 Re: CVE Request: postgresql integer overflow in hash table size calculation
http://www.openwall.com/lists/oss-security/2010/03/16/10
[pgsql-bugs] 20091028 BUG #5145: Complex query with lots of LEFT JOIN causes segfault
http://archives.postgresql.org/pgsql-bugs/2009-10/msg00277.php
[pgsql-bugs] 20091029 Re: BUG #5145: Complex query with lots of LEFT JOIN causes segfault
http://archives.postgresql.org/pgsql-bugs/2009-10/msg00287.php
http://archives.postgresql.org/pgsql-bugs/2009-10/msg00289.php
[pgsql-bugs] 20091030 Re: BUG #5145: Complex query with lots of LEFT JOIN causes segfault
http://archives.postgresql.org/pgsql-bugs/2009-10/msg00310.php
http://git.postgresql.org/gitweb?p=postgresql.git%3Ba=commit%3Bh=64b057e6823655fb6c5d1f24a28f236b94dd6c54
https://bugzilla.redhat.com/show_bug.cgi?id=546621
oval:org.mitre.oval:def:10691
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10691
Common Vulnerability Exposure (CVE) ID: CVE-2010-1169
1023988
http://www.securitytracker.com/id?1023988
39815
http://secunia.com/advisories/39815
39845
http://secunia.com/advisories/39845
39898
http://secunia.com/advisories/39898
40215
http://www.securityfocus.com/bid/40215
64755
http://osvdb.org/64755
ADV-2010-1167
http://www.vupen.com/english/advisories/2010/1167
ADV-2010-1182
http://www.vupen.com/english/advisories/2010/1182
ADV-2010-1198
http://www.vupen.com/english/advisories/2010/1198
FEDORA-2010-8696
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041559.html
FEDORA-2010-8715
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041579.html
FEDORA-2010-8723
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041591.html
RHSA-2010:0430
http://www.redhat.com/support/errata/RHSA-2010-0430.html
[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request
http://www.openwall.com/lists/oss-security/2010/05/20/5
http://www.postgresql.org/about/news.1203
http://www.postgresql.org/docs/current/static/release-7-4-29.html
http://www.postgresql.org/docs/current/static/release-8-0-25.html
http://www.postgresql.org/docs/current/static/release-8-1-21.html
http://www.postgresql.org/docs/current/static/release-8-2-17.html
http://www.postgresql.org/docs/current/static/release-8-3-11.html
http://www.postgresql.org/docs/current/static/release-8-4-4.html
http://www.postgresql.org/support/security
https://bugzilla.redhat.com/show_bug.cgi?id=582615
https://bugzilla.redhat.com/show_bug.cgi?id=588269
oval:org.mitre.oval:def:10645
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10645
postgresql-safe-code-execution(58693)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58693
Common Vulnerability Exposure (CVE) ID: CVE-2010-1170
1023987
http://www.securitytracker.com/id?1023987
64757
http://osvdb.org/64757
https://bugzilla.redhat.com/show_bug.cgi?id=583072
oval:org.mitre.oval:def:10510
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10510
Common Vulnerability Exposure (CVE) ID: CVE-2010-1447
40049
http://secunia.com/advisories/40049
40052
http://secunia.com/advisories/40052
40305
http://www.securityfocus.com/bid/40305
64756
http://osvdb.org/64756
DSA-2267
http://www.debian.org/security/2011/dsa-2267
MDVSA-2010:115
http://www.mandriva.com/security/advisories?name=MDVSA-2010:115
MDVSA-2010:116
http://www.mandriva.com/security/advisories?name=MDVSA-2010:116
RHSA-2010:0457
http://www.redhat.com/support/errata/RHSA-2010-0457.html
RHSA-2010:0458
http://www.redhat.com/support/errata/RHSA-2010-0458.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://security-tracker.debian.org/tracker/CVE-2010-1447
https://bugs.launchpad.net/bugs/cve/2010-1447
oval:org.mitre.oval:def:11530
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530
oval:org.mitre.oval:def:7320
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320
Common Vulnerability Exposure (CVE) ID: CVE-2010-1975
BugTraq ID: 40304
http://www.securityfocus.com/bid/40304
Debian Security Information: DSA-2051 (Google Search)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11004
SuSE Security Announcement: SUSE-SR:2010:014 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-3433
42325
http://secunia.com/advisories/42325
43747
http://www.securityfocus.com/bid/43747
ADV-2010-3051
http://www.vupen.com/english/advisories/2010/3051
DSA-2120
http://www.debian.org/security/2010/dsa-2120
FEDORA-2010-15954
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049591.html
FEDORA-2010-15960
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049592.html
MDVSA-2010:197
http://www.mandriva.com/security/advisories?name=MDVSA-2010:197
RHSA-2010:0742
http://www.redhat.com/support/errata/RHSA-2010-0742.html
RHSA-2010:0908
http://www.redhat.com/support/errata/RHSA-2010-0908.html
SUSE-SR:2010:019
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
SUSE-SR:2010:020
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html
USN-1002-1
http://www.ubuntu.com/usn/USN-1002-1
USN-1002-2
http://www.ubuntu.com/usn/USN-1002-2
http://www.postgresql.org/about/news.1244
http://www.postgresql.org/docs/9.0/static/release-9-0-1.html
https://bugzilla.redhat.com/show_bug.cgi?id=639371
oval:org.mitre.oval:def:7291
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7291
Common Vulnerability Exposure (CVE) ID: CVE-2010-4015
BugTraq ID: 46084
http://www.securityfocus.com/bid/46084
Debian Security Information: DSA-2157 (Google Search)
http://www.debian.org/security/2011/dsa-2157
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053888.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053817.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:021
http://osvdb.org/70740
http://www.redhat.com/support/errata/RHSA-2011-0197.html
http://www.redhat.com/support/errata/RHSA-2011-0198.html
http://secunia.com/advisories/43144
http://secunia.com/advisories/43154
http://secunia.com/advisories/43155
http://secunia.com/advisories/43187
http://secunia.com/advisories/43188
http://secunia.com/advisories/43240
SuSE Security Announcement: SUSE-SR:2011:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://www.ubuntu.com/usn/USN-1058-1
http://www.vupen.com/english/advisories/2011/0262
http://www.vupen.com/english/advisories/2011/0278
http://www.vupen.com/english/advisories/2011/0283
http://www.vupen.com/english/advisories/2011/0287
http://www.vupen.com/english/advisories/2011/0299
http://www.vupen.com/english/advisories/2011/0303
http://www.vupen.com/english/advisories/2011/0349
XForce ISS Database: postgresql-gettoken-buffer-overflow(65060)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65060
Common Vulnerability Exposure (CVE) ID: CVE-2011-2483
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
BugTraq ID: 49241
http://www.securityfocus.com/bid/49241
Debian Security Information: DSA-2340 (Google Search)
http://www.debian.org/security/2011/dsa-2340
Debian Security Information: DSA-2399 (Google Search)
http://www.debian.org/security/2012/dsa-2399
http://www.mandriva.com/security/advisories?name=MDVSA-2011:165
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
http://www.mandriva.com/security/advisories?name=MDVSA-2011:180
http://freshmeat.net/projects/crypt_blowfish
http://www.redhat.com/support/errata/RHSA-2011-1377.html
http://www.redhat.com/support/errata/RHSA-2011-1378.html
http://www.redhat.com/support/errata/RHSA-2011-1423.html
SuSE Security Announcement: SUSE-SA:2011:035 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html
http://www.ubuntu.com/usn/USN-1229-1
XForce ISS Database: php-cryptblowfish-info-disclosure(69319)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69319
CopyrightCopyright (C) 2012 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.