Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in PostgreSQL
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in PostgreSQL
ID: USN-4472-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS
Datum: Di, 25. August 2020, 16:09
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349
Applikationen: PostgreSQL

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8511751240843473458==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="tOrmZqwSss6kBOQ7q3jsrKaCNDDHepSMP"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--tOrmZqwSss6kBOQ7q3jsrKaCNDDHepSMP
Content-Type: multipart/mixed;
boundary="zBXzgA0kcpv2xb3aLCMK3FXyJotOPdF6m"

--zBXzgA0kcpv2xb3aLCMK3FXyJotOPdF6m
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4472-1
August 25, 2020

postgresql-10, postgresql-12, postgresql-9.5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in PostgreSQL.

Software Description:
- postgresql-12: Object-relational SQL database
- postgresql-10: Object-relational SQL database
- postgresql-9.5: Object-relational SQL database

Details:

Noah Misch discovered that PostgreSQL incorrectly handled the search_path
setting when used with logical replication. A remote attacker could
possibly use this issue to execute arbitrary SQL code. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-14349)

Andres Freund discovered that PostgreSQL incorrectly handled search path
elements in CREATE EXTENSION. A remote attacker could possibly use this
issue to execute arbitrary SQL code. (CVE-2020-14350)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
postgresql-12 12.4-0ubuntu0.20.04.1

Ubuntu 18.04 LTS:
postgresql-10 10.14-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
postgresql-9.5 9.5.23-0ubuntu0.16.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.

References:
https://usn.ubuntu.com/4472-1
CVE-2020-14349, CVE-2020-14350

Package Information:
https://launchpad.net/ubuntu/+source/postgresql-12/12.4-0ubuntu0.20.04.1
https://launchpad.net/ubuntu/+source/postgresql-10/10.14-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/postgresql-9.5/9.5.23-0ubuntu0.16.04.1


--zBXzgA0kcpv2xb3aLCMK3FXyJotOPdF6m--

--tOrmZqwSss6kBOQ7q3jsrKaCNDDHepSMP
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=Zcms
-----END PGP SIGNATURE-----

--tOrmZqwSss6kBOQ7q3jsrKaCNDDHepSMP--


--===============8511751240843473458==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============8511751240843473458==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung