drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in PostgreSQL
Name: |
Mehrere Probleme in PostgreSQL |
|
ID: |
USN-4972-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, Ubuntu 21.04 |
|
Datum: |
Di, 1. Juni 2021, 22:26 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028 |
|
Applikationen: |
PostgreSQL |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0866083167605243513== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="vjxBCzkBqVgZgjhgLKEfPUrfNVDhAT7Ty"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --vjxBCzkBqVgZgjhgLKEfPUrfNVDhAT7Ty Content-Type: multipart/mixed; boundary="UM4io0fDuomfFqbHP9o9u95UjjaTyg5pl"; protected-headers="v1" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> Message-ID: <aff6de0e-dcc2-b7da-e35a-ad2d904464ea@canonical.com> Subject: [USN-4972-1] PostgreSQL vulnerabilities
--UM4io0fDuomfFqbHP9o9u95UjjaTyg5pl Content-Type: text/plain; charset=utf-8 Content-Language: en-C Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4972-1 June 01, 2021
postgresql-10, postgresql-12, postgresql-13 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04 - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in PostgreSQL.
Software Description: - postgresql-13: Object-relational SQL database - postgresql-12: Object-relational SQL database - postgresql-10: Object-relational SQL database
Details:
Tom Lane discovered that PostgreSQL incorrect handled certain array subscripting calculations. An authenticated attacker could possibly use this issue to overwrite server memory and escalate privileges. (CVE-2021-32027)
Andres Freund discovered that PostgreSQL incorrect handled certain INSERT ... ON CONFLICT ... DO UPDATE commands. A remote attacker could possibly use this issue to read server memory and obtain sensitive information. (CVE-2021-32028)
Tom Lane discovered that PostgreSQL incorrect handled certain UPDATE ... RETURNING commands. A remote attacker could possibly use this issue to read server memory and obtain sensitive information. This issue only affected Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. (CVE-2021-32029)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: postgresql-13 13.3-0ubuntu0.21.04.1
Ubuntu 20.10: postgresql-12 12.7-0ubuntu0.20.10.1
Ubuntu 20.04 LTS: postgresql-12 12.7-0ubuntu0.20.04.1
Ubuntu 18.04 LTS: postgresql-10 10.17-0ubuntu0.18.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart PostgreSQL to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-4972-1 CVE-2021-32027, CVE-2021-32028, CVE-2021-32029
Package Information: https://launchpad.net/ubuntu/+source/postgresql-13/13.3-0ubuntu0.21.04.1 https://launchpad.net/ubuntu/+source/postgresql-12/12.7-0ubuntu0.20.10.1 https://launchpad.net/ubuntu/+source/postgresql-12/12.7-0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/postgresql-10/10.17-0ubuntu0.18.04.1
--UM4io0fDuomfFqbHP9o9u95UjjaTyg5pl--
--vjxBCzkBqVgZgjhgLKEfPUrfNVDhAT7Ty Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmC2Mm0ACgkQZWnYVadE vpM/9w/+NlD7RvAEB1gOzziDNGoOBHXAdT+30CEOVX0UG9ka3/4tJeuJEPrI9oOI QBMG69eUxqorMKBoW+yVbGA3+NjlAx6Zzjhe/VHhdHkLeuAxBoQz3Pw6elrg0Z2x pROnthDgsuWOOo00jof+vICAkYkXKsXoxkzkdm3MCS8i5aAp+Dp5fDGMFUPW1EOS 4K0T+51g8wbx+Lyvtku12+UQ0DhA/+F3ogrPT//F4sojifDjlwzl7yZvg6eWYF5k l2fNHr9nLnG9ZLK2rgQCqZOfVKIWZXJnIDz1C9qdmnFbTztoCtlh+SFLVe7ErsZy tFemYPwYwSFZApAGkBDVbVrY2TLTBAkjzxw4QABMBGvMU/AbmOsXS2mvaYz6Cfy+ 9SseglwdqRfkXeMvcYgunBVPm75lY8pP1gAyugERRGLe8aqZdx0t/B7GQoEf2bd/ dDDC0ISQgLfKqtUurx8qnh6P6bdjS24qaoW/5un7/tfhxYE5SbowK9ebXo7ZbJVR 4A1vhNORY7VMEbzLM+X2JTJv+XnQOjP26J9WirWpyrfVKVFwqqJQSurTn6E50paL 4oxh1SSL4TL7k+Kw98n7A6dVSO8WfTXuZLKEyPLTbJnwm1AHCOSqqfy2+EH9iuQM EhWpq/iNI9GElBMqva6ckGpdG2k2TgXJiuh7jvN0sMhhrXiQC9U= =DCxZ -----END PGP SIGNATURE-----
--vjxBCzkBqVgZgjhgLKEfPUrfNVDhAT7Ty--
--===============0866083167605243513== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============0866083167605243513==--
|
|
|
|