[USN-6570-1] PostgreSQL vulnerabilities

Ian Constantin ian.constantin at canonical.com
Tue Jan 9 19:31:28 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6570-1
January 09, 2024

postgresql-9.5 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in PostgreSQL.

Software Description:
- postgresql-9.5: Object-relational SQL database

Details:

Pedro Gallegos discovered that PostgreSQL incorrectly handled modifying
certain SQL array values. A remote attacker could use this issue to obtain
sensitive information, or possibly execute arbitrary code. (CVE-2023-5869)

Hemanth Sandrana and Mahendrakar Srinivasarao discovered that PostgreSQL
allowed the pg_signal_backend role to signal certain superuser processes,
contrary to expectations. (CVE-2023-5870)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
   postgresql-9.5                  9.5.25-0ubuntu0.16.04.1+esm6
   postgresql-client-9.5         9.5.25-0ubuntu0.16.04.1+esm6

After a standard system update you need to restart PostgreSQL to make
all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6570-1
   CVE-2023-5869, CVE-2023-5870
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240109/8bc5ae48/attachment-0001.sig>


More information about the ubuntu-security-announce mailing list