[ALSA-2020:5619] Important: postgresql:9.6 security update
Type:
security
Severity:
important
Release date:
2020-12-17
Description:
PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (9.6.20). Security Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208) * postgresql: Uncontrolled search path element in CREATE EXTENSION (CVE-2020-14350) * postgresql: psql's \gset allows overwriting specially treated variables (CVE-2020-25696) * postgresql: Selectivity estimators bypass row security policies (CVE-2019-10130) * postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks (CVE-2020-1720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages:
  • postgresql-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-contrib-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-docs-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-plperl-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-plpython3-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-pltcl-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-server-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-server-devel-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-static-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-test-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
  • postgresql-test-rpm-macros-9.6.20-1.module_el8.3.0+2029+7f0e88b6.x86_64.rpm
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.