First published: Thu Nov 14 2019(Updated: )
Rich Mirch discovered that the postgresql-common pg_ctlcluster script incorrectly handled directory creation. A local attacker could possibly use this issue to escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/postgresql-common | <204ubuntu0.1 | 204ubuntu0.1 |
=19.10 | ||
All of | ||
ubuntu/postgresql-common | <199ubuntu0.1 | 199ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/postgresql-common | <190ubuntu0.1 | 190ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/postgresql-common | <173ubuntu0.3 | 173ubuntu0.3 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this postgresql-common vulnerability is USN-4194-1.
The vulnerability was discovered by Rich Mirch.
The vulnerability can potentially be used by a local attacker to escalate privileges.
Versions 204ubuntu0.1, 199ubuntu0.1, 190ubuntu0.1, and 173ubuntu0.3 of postgresql-common are affected.
It is recommended to update postgresql-common to the latest version available, as mentioned in the Ubuntu Security Notices.