asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.
References
Link | Resource |
---|---|
https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0 | Patch Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html | Mailing List Third Party Advisory |
https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0 | Patch Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 05:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0 - Patch, Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html - Mailing List, Third Party Advisory |
Information
Published : 2020-08-12 16:15
Updated : 2024-11-21 05:08
NVD link : CVE-2020-17446
Mitre link : CVE-2020-17446
CVE.ORG link : CVE-2020-17446
JSON object : View
Products Affected
magic
- asyncpg
debian
- debian_linux
CWE
CWE-824
Access of Uninitialized Pointer