First published: Wed Oct 07 2009(Updated: )
PostgreSQL is an advanced object-relational database management system<br>(DBMS).<br>It was discovered that the upstream patch for CVE-2007-6600 included in the<br>Red Hat Security Advisory RHSA-2008:0039 did not include protection against<br>misuse of the RESET ROLE and RESET SESSION AUTHORIZATION commands. An<br>authenticated user could use this flaw to install malicious code that would<br>later execute with superuser privileges. (CVE-2009-3230)<br>All PostgreSQL users should upgrade to these updated packages, which<br>contain a backported patch to correct this issue. If you are running a<br>PostgreSQL server, the postgresql service must be restarted for this update<br>to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of RHSA-2009:1485 is classified as moderate.
To fix RHSA-2009:1485, you should apply the appropriate security updates as indicated by Red Hat.
RHSA-2009:1485 affects PostgreSQL, an advanced object-relational database management system.
RHSA-2009:1485 addresses a flaw related to the misuse of the RESET ROLE and RESET SESSION commands.
Yes, RHSA-2009:1485 is related to CVE-2007-6600 as it includes an upstream patch for that vulnerability.