postgresql: Multiple vulnerabilities (CVE-2020-14349, CVE-2020-14350)
CVE-2020-14349: uncontrolled search path element in logical replication
The PostgreSQL search_path setting determines schemas searched for tables, functions, operators, etc. The CVE-2018-1058 fix caused most PostgreSQL-provided client applications to sanitize search_path, but logical replication continued to leave search_path unchanged. Users of a replication publisher or subscriber database can create objects in the "public" schema and harness them to execute arbitrary SQL functions under the identity running replication, often a superuser. Installations having adopted a documented "secure schema usage pattern" are not vulnerable.
Fixed In Version:
postgresql 12.4, postgresql 11.9, postgresql 10.14
References:
- https://www.postgresql.org/about/news/2060/
- https://security-tracker.debian.org/tracker/CVE-2020-14349
Patches:
- https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=11da97024abbe76b8c81e3f2375b2a62e9717c67
- https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=cec57b1a0fbcd3833086ba686897c5883e0a2afc
CVE-2020-14350: uncontrolled search path element in CREATE EXTENSION
When a superuser issues certain CREATE EXTENSION statements, users may be able to execute arbitrary SQL functions under the identity of that superuser. The attacker must have permission to create objects in the new extension's schema or a schema of a prerequisite extension. Not all extensions are vulnerable. In addition to correcting the extensions provided with PostgreSQL, the project is issuing guidance for third-party extension authors to secure their own work.
Fixed In Version:
postgresql 12.4, postgresql 11.9, postgresql 10.14, postgresql 9.6.19, postgresql and 9.5.23
References:
https://www.postgresql.org/about/news/2060/
Patch:
Affected branches:
-
master -
3.12-stable -
3.11-stable -
3.10-stable -
3.9-stable