USN-4194-2

Source
https://ubuntu.com/security/notices/USN-4194-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4194-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4194-2
Upstream
Related
Published
2019-12-03T18:34:11.440831Z
Modified
2025-10-13T04:34:59Z
Summary
postgresql-common vulnerability
Details

USN-4194-1 fixed a vulnerability in postgresql-common. This update provides the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

Rich Mirch discovered that the postgresql-common pg_ctlcluster script incorrectly handled directory creation. A local attacker could possibly use this issue to escalate privileges.

References

Affected packages

Ubuntu:Pro:14.04:LTS / postgresql-common

Package

Name
postgresql-common
Purl
pkg:deb/ubuntu/postgresql-common@154ubuntu1.1+esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
154ubuntu1.1+esm1

Affected versions

Other

148
150
151
152
153
153bzr1
154
154ubuntu1

154ubuntu1.*

154ubuntu1.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "postgresql",
            "binary_version": "9.3+154ubuntu1.1+esm1"
        },
        {
            "binary_name": "postgresql-client",
            "binary_version": "9.3+154ubuntu1.1+esm1"
        },
        {
            "binary_name": "postgresql-client-common",
            "binary_version": "154ubuntu1.1+esm1"
        },
        {
            "binary_name": "postgresql-common",
            "binary_version": "154ubuntu1.1+esm1"
        },
        {
            "binary_name": "postgresql-contrib",
            "binary_version": "9.3+154ubuntu1.1+esm1"
        },
        {
            "binary_name": "postgresql-server-dev-all",
            "binary_version": "154ubuntu1.1+esm1"
        }
    ]
}

Database specific

cves_map

{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2019-3466"
        }
    ],
    "ecosystem": "Ubuntu:Pro:14.04:LTS"
}