It was discovered that PostgreSQL incorrectly performed authorization checks when handling the "ALTER ... DEPENDS ON EXTENSION" sub-commands. A remote attacker could possibly use this issue to drop any function, procedure, materialized view, index, or trigger under certain conditions.
{ "availability": "No subscription required", "binaries": [ { "libpgtypes3-dbgsym": "10.12-0ubuntu0.18.04.1", "libecpg6": "10.12-0ubuntu0.18.04.1", "postgresql-client-10-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-plpython3-10-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-plperl-10-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-server-dev-10-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-pltcl-10-dbgsym": "10.12-0ubuntu0.18.04.1", "libecpg-dev": "10.12-0ubuntu0.18.04.1", "postgresql-plperl-10": "10.12-0ubuntu0.18.04.1", "libpq5": "10.12-0ubuntu0.18.04.1", "libpq5-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-client-10": "10.12-0ubuntu0.18.04.1", "libpgtypes3": "10.12-0ubuntu0.18.04.1", "libpq-dev": "10.12-0ubuntu0.18.04.1", "libecpg-dev-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-doc-10": "10.12-0ubuntu0.18.04.1", "postgresql-plpython-10": "10.12-0ubuntu0.18.04.1", "postgresql-10": "10.12-0ubuntu0.18.04.1", "postgresql-10-dbgsym": "10.12-0ubuntu0.18.04.1", "postgresql-plpython-10-dbgsym": "10.12-0ubuntu0.18.04.1", "libecpg-compat3": "10.12-0ubuntu0.18.04.1", "postgresql-server-dev-10": "10.12-0ubuntu0.18.04.1", "postgresql-pltcl-10": "10.12-0ubuntu0.18.04.1", "postgresql-plpython3-10": "10.12-0ubuntu0.18.04.1", "libecpg-compat3-dbgsym": "10.12-0ubuntu0.18.04.1", "libecpg6-dbgsym": "10.12-0ubuntu0.18.04.1" } ] }