[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA-1874-1] postgresql-9.4 security update

Package        : postgresql-9.4
Version        : 9.4.24-0+deb8u1
CVE ID         : CVE-2019-10208

* CVE-2019-10208: `TYPE` in `pg_temp` executes arbitrary SQL during

Versions Affected: 9.4 - 11

Given a suitable `SECURITY DEFINER` function, an attacker can execute
arbitrary SQL under the identity of the function owner.  An attack
requires `EXECUTE` permission on the function, which must itself contain
a function call having inexact argument type match.  For example,
`length('foo'::varchar)` and `length('foo')` are inexact, while
`length('foo'::text)` is exact.  As part of exploiting this
vulnerability, the attacker uses `CREATE DOMAIN` to create a type in a
`pg_temp` schema. The attack pattern and fix are similar to that for

Writing `SECURITY DEFINER` functions continues to require following the
considerations noted in the documentation:


The PostgreSQL project thanks Tom Lane for reporting this problem.

For Debian 8 "Jessie", this problem has been fixed in version

We recommend that you upgrade your postgresql-9.4 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: