Mageia 2019-0204: postgresql11 security update
Summary
An authenticated user could create a stack-based buffer overflow by
changing their own password to a purpose-crafted value. In addition to
the ability to crash the PostgreSQL server, this could be further
exploited to execute arbitrary code as the PostgreSQL operating system
account.
Additionally, a rogue server could send a specifically crafted message
during the SCRAM authentication process and cause a libpq-enabled client
to either crash or execute arbitrary code as the client's operating
system account. (CVE-2019-10164)
More than 25 other bugs have been fixed too, see referenced release
notes.
References
- https://bugs.mageia.org/show_bug.cgi?id=24996
- https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10164
Resolution
MGASA-2019-0204 - Updated postgresql11 packages fix security vulnerabilities
SRPMS
- 7/core/postgresql11-11.4-1.mga7