Category
Security
Release Phase
Resolved
Bug Id
6817870, 6817871, 6818380
ProductSolaris 10 Operating System
OpenSolaris
Date of Workaround Release13-May-2009
Date of Resolved Release13-Jul-2009
Security vulnerability in PostgreSQL shipped with Solaris may allow a Denial of Service (DoS):
1. Impact
Security vulnerability affecting the PostgreSQL software shipped with
Solaris may allow an authenticated PostgreSQL users to cause a Denial
of Service (DoS) to the PostgreSQL server (due to stack consumption).
This issue is described in the following documents:
Official PostgreSQL announcement at:
CVE-2009-0922 at:
2. Contributing Factors
This issue can occur in the following releases:
SPARC Platform
- Solaris 10 PostgreSQL 8.1 without patch 123590-10
- Solaris 10 PostgreSQL 8.2 without patch 136998-06
- Solaris 10 PostgreSQL 8.3 without patch 138826-04
- OpenSolaris PostgreSQL 8.1 based upon builds snv_01 through
snv_109
- OpenSolaris PostgreSQL 8.2 based upon builds snv_81 through
snv_111
- OpenSolaris PostgreSQL 8.3 based upon builds snv_87 through
snv_111
x86 Platform
- Solaris 10 PostgreSQL 8.1 without patch 123591-10
- Solaris 10 PostgreSQL 8.2 without patch 136999-06
- Solaris 10 PostgreSQL 8.3 without patch 138827-04
- OpenSolaris PostgreSQL 8.1 based upon builds snv_01 through
snv_109
- OpenSolaris PostgreSQL 8.2 based upon builds snv_81 through
snv_111
- OpenSolaris PostgreSQL 8.3 based upon builds snv_87 through
snv_111
Note
1: Solaris 8 and Solaris 9 do not ship with PostgreSQL and are
thus not impacted by this issue.
Note 2: A user exploiting this vulnerability must have an
account on the PostgreSQL server.
Note 3: This issue affects
PostgreSQL versions 7.4.x prior to 7.4.25, 8.0.x prior to 8.0.21, 8.1.x
prior to 8.1.17, 8.2.x prior to 8.2.13 and 8.3.x prior to 8.3.7.
Note 4: PostgreSQL 8.1
(SUNWpostgr), 8.2 (packages beginning with SUNWpostgr-82) and 8.3
(packages beginning with SUNWpostgr-83) can be installed at the
same time and are separately impacted by this vulnerability.
To determine if a version of PostgreSQL is installed, the
following command can be used:
$ pkginfo | grep SUNWpostgr
system SUNWpostgr PostgreSQL 8.1.9 client programs and libraries
system SUNWpostgr-82-client PostgreSQL 8.2 client tools
To determine if PostgreSQL is running on a server, the following
command can be run as the user "postgres" (or the "root" user):
for PostgreSQL 8.1:
$ pg_ctl status -D /var/lib/pgsql/data/
pg_ctl: neither postmaster nor postgres running
for PostgreSQL 8.2:
$ /usr/postgres/8.2/bin/pg_ctl status -D /var/postgres/8.2/data/
pg_ctl: server is running (PID: 395)
for PostgreSQL 8.3:
$ /usr/postgres/8.3/bin/pg_ctl status -D /var/postgres/8.3/data/
pg_ctl: server is running (PID: 395)
or (where applicable):
$ svcs -a | grep postgresql
disabled 17:12:37 svc:/application/database/postgresql_83:default_32bit
disabled 17:12:37 svc:/application/database/postgresql:version_82
disabled 17:12:37 svc:/application/database/postgresql:version_82_64bit
online 17:13:05 svc:/application/database/postgresql_83:default_64bit
3. Symptoms
If the described issue has been exploited to cause a Denial of Service
(DoS), system response may be slow and the postgres(1) process may
crash, potentially leaving a core file.
4. Workaround
There is no workaround for this issue. Please see the Resolution
section below.
5. Resolution
This issue is addressed in the following releases:
SPARC Platform
- Solaris 10 PostgreSQL 8.1 with patch 123590-10 or later
- Solaris 10 PostgreSQL 8.2 with patch 136998-06 or later
- Solaris 10 PostgreSQL 8.3 with patch 138826-04 or later
- OpenSolaris PostgreSQL 8.2 based upon builds snv_111a or later
- OpenSolaris PostgreSQL 8.3 based upon builds snv_111a or later
x86 Platform
- Solaris 10 PostgreSQL 8.1 with patch 123591-10 or later
- Solaris 10 PostgreSQL 8.2 with patch 136999-06 or later
- Solaris 10 PostgreSQL 8.3 with patch 138827-04 or later
- OpenSolaris PostgreSQL 8.2 based upon builds snv_111a or later
- OpenSolaris PostgreSQL 8.3 based upon builds snv_111a or later
Note: PostgreSQL 8.1 was
removed from OpenSolaris snv_110 onwards.
For more information
on Security Sun Alerts, see 1009886.1.
This Sun Alert notification is being provided
to you on
an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU
ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT
OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This
Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle,
Santa
Clara, CA 95054 U.S.A. All rights reserved.Modification History
13-Jul-2009: Updated Contributing Factors and Resolution sections. Resolved.
References
123591-10
123590-10
138822-04
138823-04
138824-04
138825-04
138826-04
138827-04
136998-06
136999-06
137000-04
137001-04
137004-05
137005-05
AttachmentsThis solution has no attachment