Mageia 2020-0365: postgresql security update
Summary
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14
did not properly sanitize the search_path during logical replication. An
authenticated attacker could use this flaw in an attack similar to
CVE-2018-1058, in order to execute arbitrary SQL command in the context of
the user used for replication. (CVE-2020-14349)
It was found that some PostgreSQL extensions did not use search_path safely
in their installation script. An attacker with sufficient privileges could
use this flaw to trick an administrator into executing a specially crafted
script, during the installation or update of such extension. This affects
PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19,
and before 9.5.23. (CVE-2020-14350)
References
- https://bugs.mageia.org/show_bug.cgi?id=27110
- https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350
Resolution
MGASA-2020-0365 - Updated postgresql packages fix security vulnerabilities
SRPMS
- 7/core/postgresql9.6-9.6.19-1.mga7
- 7/core/postgresql11-11.9-1.mga7