PostgreSQL: Multiple vulnerabilities — GLSA 202003-03

Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in the execution of arbitrary code.

Affected packages

dev-db/postgresql on all architectures
Affected versions < 9.4.26
< 9.5.21
< 9.6.17
< 10.12
< 11.7
< 12.2
Unaffected versions >= 9.4.26
>= 9.5.21
>= 9.6.17
>= 10.12
>= 11.7
>= 12.2

Background

PostgreSQL is an open source object-relational database management system.

Description

Multiple vulnerabilities have been discovered in PostgreSQL. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process, bypass certain client-side connection security features, read arbitrary server memory, alter certain data or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All PostgreSQL 9.4.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.26:9.4"
 

All PostgreSQL 9.5.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.5.21:9.5"
 

All PostgreSQL 9.6.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.6.17:9.6"
 

All PostgreSQL 10.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/postgresql-10.12:10"
 

All PostgreSQL 11.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/postgresql-11.7:11"
 

All PostgreSQL 12.x users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-db/postgresql-12.2:12"
 

References

Release date
March 12, 2020

Latest revision
March 12, 2020: 2

Severity
normal

Exploitable
local, remote

Bugzilla entries