---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Mandriva update for postgresql SECUNIA ADVISORY ID: SA28376 VERIFY ADVISORY: http://secunia.com/advisories/28376/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: >From local network OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges or to cause a DoS (Denial of Service). For more information: SA28359 SOLUTION: Apply updated packages. Mandriva Linux 2007.1 77029a89f77e1a6b33f9492619cf4c7f 2007.1/i586/libecpg5-8.2.6-0.1mdv2007.1.i586.rpm 027cfd164d94abf8a9bc047f440d69eb 2007.1/i586/libecpg5-devel-8.2.6-0.1mdv2007.1.i586.rpm e237d3a12af5fd5c3ab79800da39b84b 2007.1/i586/libpq5-8.2.6-0.1mdv2007.1.i586.rpm 4779380702580f0e71d7cce1daf7a0bf 2007.1/i586/libpq5-devel-8.2.6-0.1mdv2007.1.i586.rpm 42f1928eab7563c145305ab9e99c5220 2007.1/i586/postgresql-8.2.6-0.1mdv2007.1.i586.rpm def6be26d4670e407eae8ec69c401632 2007.1/i586/postgresql-contrib-8.2.6-0.1mdv2007.1.i586.rpm c5e1019e73c699478bdb343fec2ed2dd 2007.1/i586/postgresql-devel-8.2.6-0.1mdv2007.1.i586.rpm 7897ba0eb5d0f70dcb070a7ef06bb4ed 2007.1/i586/postgresql-docs-8.2.6-0.1mdv2007.1.i586.rpm 6932d43c02f589e301d39be4031c3f07 2007.1/i586/postgresql-pl-8.2.6-0.1mdv2007.1.i586.rpm 5bd67376c50a31a6dfb9bf712b07fe8d 2007.1/i586/postgresql-plperl-8.2.6-0.1mdv2007.1.i586.rpm 8da43a277c698510d1478499214b0584 2007.1/i586/postgresql-plpgsql-8.2.6-0.1mdv2007.1.i586.rpm 7224a7efc10e60d240f9742e9a2b8d14 2007.1/i586/postgresql-plpython-8.2.6-0.1mdv2007.1.i586.rpm f01eb320fb3076de01d5e7d4b32521d2 2007.1/i586/postgresql-pltcl-8.2.6-0.1mdv2007.1.i586.rpm 07b68419e1e01cba2dd0a52f9d32c378 2007.1/i586/postgresql-server-8.2.6-0.1mdv2007.1.i586.rpm 6b11dcf03af6478308cc08ad65141c8f 2007.1/i586/postgresql-test-8.2.6-0.1mdv2007.1.i586.rpm 948085a89dc58ffd9da29984a9f771c7 2007.1/SRPMS/postgresql-8.2.6-0.1mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64 1cbc32fe73ff0a04c87b810edb643bc0 2007.1/x86_64/lib64ecpg5-8.2.6-0.1mdv2007.1.x86_64.rpm 7e4f4a263cea5c8f42778ecb5f207f71 2007.1/x86_64/lib64ecpg5-devel-8.2.6-0.1mdv2007.1.x86_64.rpm 60ab4c9a42a1f7835d93ee4e99574203 2007.1/x86_64/lib64pq5-8.2.6-0.1mdv2007.1.x86_64.rpm 507a00067b31f5bb8772e7bda2ad654c 2007.1/x86_64/lib64pq5-devel-8.2.6-0.1mdv2007.1.x86_64.rpm eb496f6a39b1426997768735e9e319e1 2007.1/x86_64/postgresql-8.2.6-0.1mdv2007.1.x86_64.rpm c0e0272261d99ba4ceecc286ecb1ce9a 2007.1/x86_64/postgresql-contrib-8.2.6-0.1mdv2007.1.x86_64.rpm 42429d8d989bf4cad22f81e33c6d9662 2007.1/x86_64/postgresql-devel-8.2.6-0.1mdv2007.1.x86_64.rpm cea86816215a1348d8d56b58fcdd00ef 2007.1/x86_64/postgresql-docs-8.2.6-0.1mdv2007.1.x86_64.rpm 8be8e2b66bc7183b5785fb8a54a35114 2007.1/x86_64/postgresql-pl-8.2.6-0.1mdv2007.1.x86_64.rpm 8f3d0636bc1a5cabeed96753f92598c8 2007.1/x86_64/postgresql-plperl-8.2.6-0.1mdv2007.1.x86_64.rpm 93920332b72908e163eff211890a025e 2007.1/x86_64/postgresql-plpgsql-8.2.6-0.1mdv2007.1.x86_64.rpm b4efc215902fdaec68eca30e6e1ffd6e 2007.1/x86_64/postgresql-plpython-8.2.6-0.1mdv2007.1.x86_64.rpm a93648ed5551e0cdeed0c3528b6f6031 2007.1/x86_64/postgresql-pltcl-8.2.6-0.1mdv2007.1.x86_64.rpm 763445788b7355eb3914dbdbc5913ec8 2007.1/x86_64/postgresql-server-8.2.6-0.1mdv2007.1.x86_64.rpm 5993401568c7e3e8fcd62a30264cd5b2 2007.1/x86_64/postgresql-test-8.2.6-0.1mdv2007.1.x86_64.rpm 948085a89dc58ffd9da29984a9f771c7 2007.1/SRPMS/postgresql-8.2.6-0.1mdv2007.1.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:004 OTHER REFERENCES: SA28359: http://secunia.com/advisories/28359/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------