It was discovered that PostgreSQL incorrectly handled certain trigger definitions when running pgupgrade or pgdump. A remote attacker could possibly use this issue to execute arbitrary SQL statements with superuser privileges.
{ "availability": "No subscription required", "binaries": [ { "libpgtypes3-dbgsym": "10.6-0ubuntu0.18.04.1", "libecpg6": "10.6-0ubuntu0.18.04.1", "postgresql-client-10-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-plpython3-10-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-plperl-10-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-server-dev-10-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-pltcl-10-dbgsym": "10.6-0ubuntu0.18.04.1", "libecpg-dev": "10.6-0ubuntu0.18.04.1", "postgresql-plperl-10": "10.6-0ubuntu0.18.04.1", "libpq5": "10.6-0ubuntu0.18.04.1", "libpq5-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-client-10": "10.6-0ubuntu0.18.04.1", "libpgtypes3": "10.6-0ubuntu0.18.04.1", "libpq-dev": "10.6-0ubuntu0.18.04.1", "libecpg-dev-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-doc-10": "10.6-0ubuntu0.18.04.1", "postgresql-plpython-10": "10.6-0ubuntu0.18.04.1", "postgresql-10": "10.6-0ubuntu0.18.04.1", "postgresql-10-dbgsym": "10.6-0ubuntu0.18.04.1", "postgresql-plpython-10-dbgsym": "10.6-0ubuntu0.18.04.1", "libecpg-compat3": "10.6-0ubuntu0.18.04.1", "postgresql-server-dev-10": "10.6-0ubuntu0.18.04.1", "postgresql-pltcl-10": "10.6-0ubuntu0.18.04.1", "postgresql-plpython3-10": "10.6-0ubuntu0.18.04.1", "libecpg-compat3-dbgsym": "10.6-0ubuntu0.18.04.1", "libecpg6-dbgsym": "10.6-0ubuntu0.18.04.1" } ] }