USN-4090-1: PostgreSQL vulnerabilities
postgresql-10, postgresql-11, postgresql-9.5 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary
Several security issues were fixed in PostgreSQL.
Software Description
- postgresql-11 - Object-relational SQL database
- postgresql-10 - Object-relational SQL database
- postgresql-9.5 - Object-relational SQL database
Details
Tom Lane discovered that PostgreSQL did not properly restrict functions declared as "SECURITY DEFINER". An attacker could use this to execute arbitrary SQL with the permissions of the function owner. (CVE-2019-10208)
Andreas Seltenreich discovered that PostgreSQL did not properly handle user-defined hash equality operators. An attacker could use this to expose sensitive information (arbitrary PostgreSQL server memory). This issue only affected Ubuntu 19.04. (CVE-2019-10209)
Update instructions
The problem can be corrected by updating your system to the following package versions:
- Ubuntu 19.04
- postgresql-11 - 11.5-0ubuntu0.19.04.1
- Ubuntu 18.04 LTS
- postgresql-10 - 10.10-0ubuntu0.18.04.1
- Ubuntu 16.04 LTS
- postgresql-9.5 - 9.5.19-0ubuntu0.16.04.1
To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart PostgreSQL to make all the necessary changes.
References
from Ubuntu Security Notices https://ift.tt/2YSofXt