Linux Security
    Linux Security
    Linux Security

    Debian LTS: DLA-1994-1: postgresql-common security update

    Date
    456
    Posted By
    Rich Mirch discovered that the pg_ctlcluster script didn't drop privileges when creating socket/statistics temporary directories, which could result in local privilege escalation.
    Package        : postgresql-common
    Version        : 165+deb8u4
    CVE ID         : CVE-2019-3466
    
    Rich Mirch discovered that the pg_ctlcluster script didn't drop
    privileges when creating socket/statistics temporary directories, which
    could result in local privilege escalation.
    
    For the oldoldstable distribution (jessie), this problem has been fixed
    in version 165+deb8u4.
    
    We recommend that you upgrade your postgresql-common packages.
    
    For the detailed security status of postgresql-common please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/postgresql-common
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.