drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in PostgreSQL (Aktualisierung)
| Name: |
Ausführen beliebiger Kommandos in PostgreSQL (Aktualisierung) |
|
| ID: |
USN-7315-2 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 18.04 LTS |
|
| Datum: |
Mi, 30. April 2025, 23:19 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2025-1094 |
|
| Applikationen: |
PostgreSQL |
|
| Update von: |
Ausführen beliebiger Kommandos in PostgreSQL |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4670997431288120614== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------lNwE4lb0TzvWjDLuGOHF6h4T"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------lNwE4lb0TzvWjDLuGOHF6h4T Content-Type: multipart/mixed; boundary="------------ElG00QB9nIKKz4UYdXyua0Ja"; protected-headers="v1" From: Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com> Reply-To: security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <205c4eac-1ead-4d8c-92ba-da0ae8951810@canonical.com> Subject: [USN-7315-2] PostgreSQL vulnerability
--------------ElG00QB9nIKKz4UYdXyua0Ja Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7315-2 April 30, 2025
postgresql-10 vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
PostgreSQL could be made to execute arbitrary code if it received specially crafted input.
Software Description: - postgresql-10: Object-relational SQL database
Details:
USN-7315-1 fixed a vulnerability in PostgreSQL. This update provides the corresponding update for Ubuntu 18.04 LTS.
Original advisory details:
Stephen Fewer discovered that PostgreSQL incorrectly handled quoting syntax in certain scenarios. A remote attacker could possibly use this issue to perform SQL injection attacks.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS postgresql-10 10.23-0ubuntu0.18.04.2+esm3 Available with Ubuntu Pro postgresql-client-10 10.23-0ubuntu0.18.04.2+esm3 Available with Ubuntu Pro
After a standard system update you need to restart PostgreSQL to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7315-2 https://ubuntu.com/security/notices/USN-7315-1 CVE-2025-1094
--------------ElG00QB9nIKKz4UYdXyua0Ja--
--------------lNwE4lb0TzvWjDLuGOHF6h4T Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEELOLXZEFYQHcSWEHiyfW2m9Ldu6sFAmgSHawFAwAAAAAACgkQyfW2m9Ldu6vE /A/+Jq7Md2mebWEY4XX1l5KBy757YC1rDH9u8UjVoGk6fb1khHhAQAV7FESt+XhgE1Ky/l4zTeBh kRxLlCDhunGsUmEoW9Dvf/5fu1Qzpy+qduG9gJ39Dz+rjnZkQrGqn543hz+F61bEe4XUelLMNK38 v9HAld7z9aObOmFt0DW9Sn0c15Qfr1q0ZhigmbaU2kjJV3z91jPdc74hUy/dDskva2DQ3z9urMrg yVd0syygV98LxdOwcc3nxcvP7tDs+LFJViGpjXpr0OV1sZ7U2e/UvV9d625iRlxVVk8jgdP/ndwN m3CfmpEsykq/1XSUTuk/7hXFPrdJjmbBlIK6OHtGi9LS/MZL5rhC8dUEW31K16FSMJXHu4kX66wt g7xtUPKnlqY5tZkOQXf1uWfeja5+Fs4JaEXrUPzONVHt1o58VVs6cvwy5DJ7gEVSswfr/xIIFiXT um9HkleTTLD2F2555r+GhJlS6Jf5fFGl5oxYVl+tHEmT+Zncer6BeSbeEE4BTFclE7Ty8/MlmDSP T/LMXd7Ly+bwdWNMJIH0QuEIH5ef8MtjBHcN2S+VJU0hu7EogtcPR01wRKCNrckSmv0rcUAnA+T7 NAXDvaWOgQmOUh89Kb/MUmX+BxaH77s7bfWffZ8jlnkMrNI1vG8IX8280xN4S+sqYxaoAAmVe0u+ rJc= =Q9au -----END PGP SIGNATURE-----
--------------lNwE4lb0TzvWjDLuGOHF6h4T--
--===============4670997431288120614== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============4670997431288120614==--
|
|
|
|