ALT-BU-2020-3972-1
Branch sisyphus update bulletin.
Package postgresql12 updated to version 12.4-alt1 for branch sisyphus in task 256186.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql9.5 updated to version 9.5.23-alt1 for branch sisyphus in task 256186.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql9.6 updated to version 9.6.19-alt1 for branch sisyphus in task 256186.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql10 updated to version 10.14-alt1 for branch sisyphus in task 256186.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql11-1C updated to version 11.9-alt1 for branch sisyphus in task 256186.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql11 updated to version 11.9-alt1 for branch sisyphus in task 256186.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Closed vulnerabilities
BDU:2021-03629
Уязвимость функции Job::onEntry из jobs.cpp архиватора Ark, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2020-16116
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
- openSUSE-SU-2020:1183
- openSUSE-SU-2020:1183
- https://github.com/KDE/ark/commits/master
- https://github.com/KDE/ark/commits/master
- https://invent.kde.org/utilities/ark/-/commit/0df592524fed305d6fbe74ddf8a196bc9ffdb92f
- https://invent.kde.org/utilities/ark/-/commit/0df592524fed305d6fbe74ddf8a196bc9ffdb92f
- https://kde.org/info/security/advisory-20200730-1.txt
- https://kde.org/info/security/advisory-20200730-1.txt
- [debian-lts-announce] 20220520 [SECURITY] [DLA 3015-1] ark security update
- [debian-lts-announce] 20220520 [SECURITY] [DLA 3015-1] ark security update
- FEDORA-2020-e2fe8f0165
- FEDORA-2020-e2fe8f0165
- FEDORA-2020-cac5ae9b6e
- FEDORA-2020-cac5ae9b6e
- GLSA-202008-03
- GLSA-202008-03
- USN-4461-1
- USN-4461-1
- https://www.debian.org/security/2020/dsa-4738
- https://www.debian.org/security/2020/dsa-4738