[USN-3818-1] PostgreSQL vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”icKV6BW5zod2OkOJlz96eBgpFTUZKCujW”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–icKV6BW5zod2OkOJlz96eBgpFTUZKCujW

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3818-1] PostgreSQL vulnerability

–XOdmzQnLXiVZzOyWh3VngkcZioWmTbRYo

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3818-1
November 14, 2018

postgresql-10 vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS

Summary:

PostgreSQL could be made to run SQL statements as the administrator.

Software Description:
– postgresql-10: Object-relational SQL database

Details:

It was discovered that PostgreSQL incorrectly handled certain trigger
definitions when running pg_upgrade or pg_dump. A remote attacker could
possibly use this issue to execute arbitrary SQL statements with superuse=
r
privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
postgresql-10 10.6-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
postgresql-10 10.6-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3818-1
CVE-2018-16850

Package Information:
https://launchpad.net/ubuntu/+source/postgresql-10/10.6-0ubuntu0.18.10.=
1
https://launchpad.net/ubuntu/+source/postgresql-10/10.6-0ubuntu0.18.04.=
1

–XOdmzQnLXiVZzOyWh3VngkcZioWmTbRYo–

–icKV6BW5zod2OkOJlz96eBgpFTUZKCujW

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=wI8J
—–END PGP SIGNATURE—–

–icKV6BW5zod2OkOJlz96eBgpFTUZKCujW–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK