PostgreSQL 7.2.2: biztonsági frissítés kiadás

Címkék

A PostgreSQL-ben újabban felfedezett biztonsági hibákat (puffer túlcsordulás) orvosolandó megjelent a PostgreSQL 7.2.2. A megjegyzésben olvashatjuk, hogy ezek a hibák csak akkor kritikusak, ha 'open' vagy 'shared' adatbázis-szerverként használjuk a pgSQL-t. A hibák kihasználásához connectolni kell tudni az adabázis szerverhez.

Bejelentés:From: "Marc G. Fournier" [scrappy@hub.org]

To: pgsql-announce@postgresql.org

Subject: [GENERAL] PostgreSQL 7.2.2: Security Release

Date: Sat, 24 Aug 2002 00:22:17 -0300 (ADT)

Cc: freebsd-databases@freebsd.org, [pgsql-general@postgresql.org], Vince

Vielhaber [vev@michvhf.com]

Due to recent security vulnerabilities reported on BugTraq, concerning several buffer overruns found in PostgreSQL, the postgreSQL Global Development Team today released v7.2.2 of PostgreSQL that fixes these vulnerabilities.

The following buffer overruns have been identified and addressed:

... in handling long datetime input

... in repeat()

... in lpad() and rpad() with multibyte

... in SET TIME ZONE and TZ env var

Although v7.2.2 is a purely plug-n-play upgrade from v7.2.1, requiring no dump-n-reload of the database, it should be noted that these vulnerabilities are only critical on "open" or "shared" systems, as they require the ability to be able to connect to the database before they can be exploited.

The latest release is available at:

ftp://ftp.postgresql.org/pub/sources/v7.2.2

As well as at appropriate mirror sites.

Please report any bugs/problems with this release to:

pgsql-bugs@postgresql.org

Marc G. Fournier

Co-ordinator

PostgreSQL Global Development Group