USN-4633-1: PostgreSQL vulnerabilities
23809
11 December 2020
11 December 2020
CLOSED
MEDIUM
CVE-2020-25694,CVE-2020-25695,CVE-2020-25696
Severity
Medium
Vendor
Canonical Ubuntu
Versions Affected
- Canonical Ubuntu 16.04
Description
Peter Eisentraut discovered that PostgreSQL incorrectly handled connection security settings. Client applications could possibly be connecting with certain security parameters dropped, contrary to expectations. (CVE-2020-25694)
Etienne Stalmans discovered that PostgreSQL incorrectly handled the security restricted operation sandbox. An authenticated remote attacker could possibly use this issue to execute arbitrary SQL functions as a superuser. (CVE-2020-25695)
Nick Cleaton discovered that PostgreSQL incorrectly handled the \gset meta-command. A remote attacker with a compromised server could possibly use this issue to execute arbitrary code. (CVE-2020-25696)
CVEs contained in this USN include: CVE-2020-25694, CVE-2020-25695, CVE-2020-25696
Affected VMware Products and Versions
Severity is medium unless otherwise noted.
- Operations Manager
- 2.7 versions prior to 2.7.26
- 2.9 versions prior to 2.9.14
- 2.10 versions prior to 2.10.4
Mitigation
Users of affected products are strongly encouraged to follow the mitigation below. Upgrade VMware Tanzu products that use earlier versions of CF components to new Tanzu releases using new versions linked above. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:- Operations Manager
- 2.7.26
- 2.9.14
- 2.10.4
References
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25694
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25695
- https://people.canonical.com/~ubuntu-security/cve/CVE-2020-25696
- https://ubuntu.com/security/notices/USN-4633-1
History
2020-12-11: Initial vulnerability report published.