It was discovered that PostgreSQL incorrectly handled certain trigger definitions when running pgupgrade or pgdump. A remote attacker could possibly use this issue to execute arbitrary SQL statements with superuser privileges.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libecpg-compat3", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "libecpg-dev", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "libecpg6", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "libpgtypes3", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "libpq-dev", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "libpq5", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-client-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-doc-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-plperl-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-plpython-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-plpython3-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-pltcl-10", "binary_version": "10.6-0ubuntu0.18.04.1" }, { "binary_name": "postgresql-server-dev-10", "binary_version": "10.6-0ubuntu0.18.04.1" } ] }
{ "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2018-16850" } ], "ecosystem": "Ubuntu:18.04:LTS" }