USN-4633-1: PostgreSQL vulnerabilities
- Canonical Ubuntu 16.04
Peter Eisentraut discovered that PostgreSQL incorrectly handled connection security settings. Client applications could possibly be connecting with certain security parameters dropped, contrary to expectations. (CVE-2020-25694)
Etienne Stalmans discovered that PostgreSQL incorrectly handled the security restricted operation sandbox. An authenticated remote attacker could possibly use this issue to execute arbitrary SQL functions as a superuser. (CVE-2020-25695)
Nick Cleaton discovered that PostgreSQL incorrectly handled the \gset meta-command. A remote attacker with a compromised server could possibly use this issue to execute arbitrary code. (CVE-2020-25696)
CVEs contained in this USN include: CVE-2020-25694, CVE-2020-25695, CVE-2020-25696
Severity is medium unless otherwise noted.
- 2.7 versions prior to 2.7.26
- 2.9 versions prior to 2.9.14
- 2.10 versions prior to 2.10.4
Users of affected products are strongly encouraged to follow the mitigation below. Upgrade VMware Tanzu products that use earlier versions of CF components to new Tanzu releases using new versions linked above. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:
2020-12-11: Initial vulnerability report published.