Linux Security
    Linux Security
    Linux Security

    Ubuntu 4633-1: PostgreSQL vulnerabilities

    Date 17 Nov 2020
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in PostgreSQL.
    Ubuntu Security Notice USN-4633-1
    November 17, 2020
    postgresql-10, postgresql-12, postgresql-9.5 vulnerabilities
    A security issue affects these releases of Ubuntu and its derivatives:
    - Ubuntu 20.10
    - Ubuntu 20.04 LTS
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    Several security issues were fixed in PostgreSQL.
    Software Description:
    - postgresql-12: Object-relational SQL database
    - postgresql-10: Object-relational SQL database
    - postgresql-9.5: Object-relational SQL database
    Peter Eisentraut discovered that PostgreSQL incorrectly handled connection
    security settings. Client applications could possibly be connecting with
    certain security parameters dropped, contrary to expectations.
    Etienne Stalmans discovered that PostgreSQL incorrectly handled the
    security restricted operation sandbox. An authenticated remote attacker
    could possibly use this issue to execute arbitrary SQL functions as a
    superuser. (CVE-2020-25695)
    Nick Cleaton discovered that PostgreSQL incorrectly handled the \gset
    meta-command. A remote attacker with a compromised server could possibly
    use this issue to execute arbitrary code. (CVE-2020-25696)
    Update instructions:
    The problem can be corrected by updating your system to the following
    package versions:
    Ubuntu 20.10:
      postgresql-12                   12.5-0ubuntu0.20.10.1
    Ubuntu 20.04 LTS:
      postgresql-12                   12.5-0ubuntu0.20.04.1
    Ubuntu 18.04 LTS:
      postgresql-10                   10.15-0ubuntu0.18.04.1
    Ubuntu 16.04 LTS:
      postgresql-9.5                  9.5.24-0ubuntu0.16.04.1
    This update uses a new upstream release, which includes additional bug
    fixes. After a standard system update you need to restart PostgreSQL to
    make all the necessary changes.
      CVE-2020-25694, CVE-2020-25695, CVE-2020-25696
    Package Information:

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"22","type":"x","order":"1","pct":34.92,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"13","type":"x","order":"2","pct":20.63,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"28","type":"x","order":"3","pct":44.44,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.