All Vulnerability Reports

USN-4633-1: PostgreSQL vulnerabilities


Severity

Medium

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 16.04

Description

Peter Eisentraut discovered that PostgreSQL incorrectly handled connection security settings. Client applications could possibly be connecting with certain security parameters dropped, contrary to expectations. (CVE-2020-25694)

Etienne Stalmans discovered that PostgreSQL incorrectly handled the security restricted operation sandbox. An authenticated remote attacker could possibly use this issue to execute arbitrary SQL functions as a superuser. (CVE-2020-25695)

Nick Cleaton discovered that PostgreSQL incorrectly handled the \gset meta-command. A remote attacker with a compromised server could possibly use this issue to execute arbitrary code. (CVE-2020-25696)

CVEs contained in this USN include: CVE-2020-25694, CVE-2020-25695, CVE-2020-25696

Affected VMware Products and Versions

Severity is medium unless otherwise noted.

  • Operations Manager
    • 2.7 versions prior to 2.7.26
    • 2.9 versions prior to 2.9.14
    • 2.10 versions prior to 2.10.4

Mitigation

Users of affected products are strongly encouraged to follow the mitigation below. Upgrade VMware Tanzu products that use earlier versions of CF components to new Tanzu releases using new versions linked above. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:

  • Operations Manager
    • 2.7.26
    • 2.9.14
    • 2.10.4

References

History

2020-12-11: Initial vulnerability report published.