A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "postgresql-12-dbgsym": "12.7-0ubuntu0.20.04.1", "libecpg6": "12.7-0ubuntu0.20.04.1", "postgresql-doc-12": "12.7-0ubuntu0.20.04.1", "libecpg-dev": "12.7-0ubuntu0.20.04.1", "postgresql-client-12-dbgsym": "12.7-0ubuntu0.20.04.1", "postgresql-client-12": "12.7-0ubuntu0.20.04.1", "libpq5": "12.7-0ubuntu0.20.04.1", "libpq5-dbgsym": "12.7-0ubuntu0.20.04.1", "postgresql-server-dev-12": "12.7-0ubuntu0.20.04.1", "postgresql-pltcl-12-dbgsym": "12.7-0ubuntu0.20.04.1", "libpq-dev": "12.7-0ubuntu0.20.04.1", "libpgtypes3": "12.7-0ubuntu0.20.04.1", "libecpg-dev-dbgsym": "12.7-0ubuntu0.20.04.1", "postgresql-plpython3-12": "12.7-0ubuntu0.20.04.1", "postgresql-plpython3-12-dbgsym": "12.7-0ubuntu0.20.04.1", "postgresql-pltcl-12": "12.7-0ubuntu0.20.04.1", "libpgtypes3-dbgsym": "12.7-0ubuntu0.20.04.1", "libecpg-compat3": "12.7-0ubuntu0.20.04.1", "postgresql-plperl-12": "12.7-0ubuntu0.20.04.1", "postgresql-12": "12.7-0ubuntu0.20.04.1", "postgresql-plperl-12-dbgsym": "12.7-0ubuntu0.20.04.1", "libecpg-compat3-dbgsym": "12.7-0ubuntu0.20.04.1", "libecpg6-dbgsym": "12.7-0ubuntu0.20.04.1" } ] }