Debian Security Advisory
DLA-2478-1 postgresql-9.6 -- LTS security update
- Date Reported:
- 02 Dec 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-25694, CVE-2020-25695, CVE-2020-25696.
- More information:
Several vulnerabilities have been found in the PostgreSQL database system.
Peter Eisentraut found that database reconnections may drop options from the original connection, such as encryption, which could lead to information disclosure or a man-in-the-middle attack.
Etienne Stalmans reported that a user with permissions to create non-temporary objects in an schema can execute arbitrary SQL functions as a superuser.
Nick Cleaton found that the \gset command modified variables that control the psql behaviour, which could result in a compromised or malicious server executing arbitrary code in the user session.
For Debian 9 stretch, these problems have been fixed in version 9.6.20-0+deb9u1.
We recommend that you upgrade your postgresql-9.6 packages.
For the detailed security status of postgresql-9.6 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/postgresql-9.6
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS