Exploit/Advisories no image

Published on June 1st, 2024 📆 | 5895 Views ⚑

0

Ubuntu Security Notice USN-6802-1 – Torchsec


iSpeech.org

==========================================================================
Ubuntu Security Notice USN-6802-1
May 30, 2024

postgresql-14, postgresql-15, postgresql-16 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 23.10
- Ubuntu 22.04 LTS

Summary:

PostgreSQL could be made to expose sensitive information.

Software Description:
- postgresql-16: Object-relational SQL database
- postgresql-15: Object-relational SQL database
- postgresql-14: Object-relational SQL database

Details:

Lukas Fittl discovered that PostgreSQL incorrectly performed authorization
in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged
database user can use this issue to read most common values and other
statistics from CREATE STATISTICS commands of other users.

NOTE: This update will only fix fresh PostgreSQL installations. Current
PostgreSQL installations will remain vulnerable to this issue until manual
steps are performed. Please see the instructions in the changelog located
at /usr/share/doc/postgresql-*/changelog.Debian.gz after the updated
packages have been installed, or in the PostgreSQL release notes located
here:





https://www.postgresql.org/docs/16/release-16-3.html
https://www.postgresql.org/docs/15/release-15-7.html
https://www.postgresql.org/docs/14/release-14-12.html

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
postgresql-16 16.3-0ubuntu0.24.04.1
postgresql-client-16 16.3-0ubuntu0.24.04.1

Ubuntu 23.10
postgresql-15 15.7-0ubuntu0.23.10.1
postgresql-client-15 15.7-0ubuntu0.23.10.1

Ubuntu 22.04 LTS
postgresql-14 14.12-0ubuntu0.22.04.1
postgresql-client-14 14.12-0ubuntu0.22.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes, and possibly perform manual steps as
described above.

References:
https://ubuntu.com/security/notices/USN-6802-1
CVE-2024-4317

Package Information:
https://launchpad.net/ubuntu/+source/postgresql-16/16.3-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/postgresql-15/15.7-0ubuntu0.23.10.1
https://launchpad.net/ubuntu/+source/postgresql-14/14.12-0ubuntu0.22.04.1

Source link

Tagged with:



Leave a Reply

Your email address will not be published.