USN-6366-1: PostgreSQL vulnerability
13 September 2023
PostgreSQL could be made to execute commands as the bootstrap superuser.
Releases
Packages
- postgresql-9.5 - Object-relational SQL database
Details
It was discovered that PostgreSQL incorrectly handled certain extension
script substitutions. An attacker having database-level CREATE privileges
can use this issue to execute arbitrary code as the bootstrap superuser.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
postgresql-9.5
-
9.5.25-0ubuntu0.16.04.1+esm5
Available with Ubuntu Pro
-
postgresql-client-9.5
-
9.5.25-0ubuntu0.16.04.1+esm5
Available with Ubuntu Pro
After a standard system update you need to restart PostgreSQL to make
all the necessary changes.
References
Related notices
- USN-6296-1: postgresql-client-12, libecpg-dev, postgresql-pltcl-14, postgresql-server-dev-14, libpq-dev, postgresql-client-15, postgresql-14, postgresql-client-14, postgresql-plpython3-14, postgresql-plperl-15, postgresql-server-dev-15, postgresql-plpython3-15, postgresql-pltcl-15, postgresql-plperl-12, postgresql-doc-12, postgresql-server-dev-12, libpq5, postgresql-plperl-14, postgresql-15, libecpg-compat3, postgresql-plpython3-12, postgresql-doc-14, libpgtypes3, postgresql-pltcl-12, postgresql-doc-15, postgresql-12, libecpg6