News

Tuesday, August 21, 2012

ubuntu-security-announce Digest, Vol 95, Issue 11

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-1542-1] PostgreSQL vulnerabilities (Jamie Strandboge)
2. [USN-1543-1] Config-IniFiles vulnerability (Jamie Strandboge)


----------------------------------------------------------------------

Message: 1
Date: Mon, 20 Aug 2012 20:47:30 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1542-1] PostgreSQL vulnerabilities
Message-ID: <1345513650.26782.12.camel@localhost>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-1542-1
August 21, 2012

postgresql-8.3, postgresql-8.4, postgresql-9.1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

PostgreSQL could allow unintended access to files over the network when
using the XML2 extension.

Software Description:
- postgresql-9.1: Object-relational SQL database
- postgresql-8.4: Object-relational SQL database
- postgresql-8.3: Object-relational SQL database

Details:

Peter Eisentraut discovered that the XSLT functionality in the optional
XML2 extension would allow unprivileged database users to both read and
write data with the privileges of the database server. (CVE-2012-3488)

Noah Misch and Tom Lane discovered that the XML functionality in the
optional XML2 extension would allow unprivileged database users to
read data with the privileges of the database server. (CVE-2012-3489)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
postgresql-9.1 9.1.5-0ubuntu12.04

Ubuntu 11.10:
postgresql-9.1 9.1.5-0ubuntu11.10

Ubuntu 11.04:
postgresql-8.4 8.4.13-0ubuntu11.04

Ubuntu 10.04 LTS:
postgresql-8.4 8.4.13-0ubuntu10.04

Ubuntu 8.04 LTS:
postgresql-8.3 8.3.20-0ubuntu8.04

This update uses a new upstream release, which includes additional bug
fixes. Due to upstream security policies, this update removes the ability
of xslt_process() to fetch documents or stylesheets from external URLs.
Please see http://www.postgresql.org/about/news/1407/ for more information.
In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1542-1
CVE-2012-3488, CVE-2012-3489

Package Information:
https://launchpad.net/ubuntu/+source/postgresql-9.1/9.1.5-0ubuntu12.04
https://launchpad.net/ubuntu/+source/postgresql-9.1/9.1.5-0ubuntu11.10
https://launchpad.net/ubuntu/+source/postgresql-8.4/8.4.13-0ubuntu11.04
https://launchpad.net/ubuntu/+source/postgresql-8.4/8.4.13-0ubuntu10.04
https://launchpad.net/ubuntu/+source/postgresql-8.3/8.3.20-0ubuntu8.04


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20120820/435c471a/attachment-0001.pgp>

------------------------------

Message: 2
Date: Mon, 20 Aug 2012 20:57:57 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-1543-1] Config-IniFiles vulnerability
Message-ID: <1345514277.26782.13.camel@localhost>
Content-Type: text/plain; charset="utf-8"

==========================================================================
Ubuntu Security Notice USN-1543-1
August 20, 2012

libconfig-inifiles-perl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS

Summary:

Config-IniFiles could be made to overwrite arbitrary files.

Software Description:
- libconfig-inifiles-perl: Perl module for working with INI configuration files

Details:

It was discovered that the perl Config::IniFiles module created temporary
files in an unsafe manner. A local user with write access to the directory
containing a configuration file that Config-IniFiles manipulates could
exploit this to overwrite arbitrary files.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
libconfig-inifiles-perl 2.68-1ubuntu0.12.04.1

Ubuntu 11.10:
libconfig-inifiles-perl 2.68-1ubuntu0.11.10.1

Ubuntu 11.04:
libconfig-inifiles-perl 2.58-1ubuntu0.1

Ubuntu 10.04 LTS:
libconfig-inifiles-perl 2.52-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1543-1
CVE-2012-2451

Package Information:
https://launchpad.net/ubuntu/+source/libconfig-inifiles-perl/2.68-1ubuntu0.12.04.1
https://launchpad.net/ubuntu/+source/libconfig-inifiles-perl/2.68-1ubuntu0.11.10.1
https://launchpad.net/ubuntu/+source/libconfig-inifiles-perl/2.58-1ubuntu0.1
https://launchpad.net/ubuntu/+source/libconfig-inifiles-perl/2.52-1ubuntu0.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20120820/aad8d0a0/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 95, Issue 11
********************************************************

No comments:

Blog Archive