Name | CVE-2020-14350 |
Description | It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2331-1 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
postgresql-11 | source | buster | 11.9-0+deb10u1 | |||
postgresql-11 | source | (unstable) | (unfixed) | |||
postgresql-12 | source | (unstable) | 12.4-1 | |||
postgresql-9.6 | source | stretch | 9.6.19-0+deb9u1 | DLA-2331-1 | ||
postgresql-9.6 | source | (unstable) | (unfixed) |
https://www.postgresql.org/about/news/2060/
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=7eeb1d9861b0a3f453f8b31c7648396cdd7f1e59