Debian 9671 Published by

A postgresql-9.6 security update has been released for Debian GNU/Linux 9 Extended LTS to address several security vulnerabilities.

ELA-1001-1 postgresql-9.6 security update

Package : postgresql-9.6
Version : 9.6.24-0+deb9u5 (stretch)

Related CVEs :

Several security vulnerabilities have been found in PostgreSQL, an advanced
open source database.

Certain aggregate function calls receiving "unknown"-type arguments could
disclose bytes of server memory from the end of the "unknown"-type value to
the next zero byte. One typically gets an "unknown"-type value via a string
literal having no type designation.

While modifying certain SQL array values, missing overflow checks let
authenticated database users write arbitrary bytes to a memory area that
facilitates arbitrary code execution. Missing overflow checks also let
authenticated database users read a wide area of server memory. The
CVE-2021-32027 fix covered some attacks of this description, but it missed

Documentation says the pg_signal_backend role cannot signal "a backend
owned by a superuser". On the contrary, it can signal background workers,
including the logical replication launcher. It can signal autovacuum
workers and the autovacuum launcher. Signaling autovacuum workers and those
two launchers provides no meaningful exploit, so exploiting this
vulnerability requires a non-core extension with a less-resilient
background worker. For example, a non-core background worker that does not
auto-restart would experience a denial of service with respect to that
particular background worker.

In the EXTENSION SCRIPT, a SQL Injection vulnerability was found in
PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a
quoting construct (dollar quoting, '', or ""). If an administrator has
installed files of a vulnerable, trusted, non-bundled extension, an
attacker with database-level CREATE privilege can execute arbitrary code as
the bootstrap superuser.

ELA-1001-1 postgresql-9.6 security update