Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-5269-01

Red Hat Security Advisory 2023-5269-01 - PostgreSQL is an advanced object-relational database management system.

Packet Storm
#sql#vulnerability#mac#linux#red_hat#js#perl#postgres

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: postgresql:15 security update
Advisory ID: RHSA-2023:5269-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5269
Issue date: 2023-09-19
CVE Names: CVE-2023-2454 CVE-2023-2455
=====================================================================

  1. Summary:

An update for the postgresql:15 module is now available for Red Hat
Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

Security Fix(es):

  • postgresql: schema_element defeats protective search_path changes
    (CVE-2023-2454)

  • postgresql: row security policies disregard user ID changes after
    inlining. (CVE-2023-2455)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2207568 - CVE-2023-2454 postgresql: schema_element defeats protective search_path changes
2207569 - CVE-2023-2455 postgresql: row security policies disregard user ID changes after inlining.

  1. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
pg_repack-1.4.8-1.module+el8.8.0+17071+aaaceaa4.src.rpm
pgaudit-1.7.0-1.module+el8.8.0+17071+aaaceaa4.src.rpm
postgres-decoderbufs-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.src.rpm
postgresql-15.3-1.module+el8.8.0+19565+1b0ddae0.src.rpm

aarch64:
pg_repack-1.4.8-1.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
pg_repack-debuginfo-1.4.8-1.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
pg_repack-debugsource-1.4.8-1.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
pgaudit-1.7.0-1.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
pgaudit-debuginfo-1.7.0-1.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
pgaudit-debugsource-1.7.0-1.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
postgres-decoderbufs-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
postgres-decoderbufs-debuginfo-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.aarch64.rpm
postgresql-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-contrib-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-contrib-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-debugsource-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-docs-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-docs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-plperl-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-plperl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-plpython3-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-plpython3-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-pltcl-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-pltcl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-private-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-private-libs-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-private-libs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-server-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-server-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-server-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-server-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-static-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-test-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-test-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-upgrade-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-upgrade-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-upgrade-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm
postgresql-upgrade-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.aarch64.rpm

noarch:
postgresql-test-rpm-macros-15.3-1.module+el8.8.0+19565+1b0ddae0.noarch.rpm

ppc64le:
pg_repack-1.4.8-1.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
pg_repack-debuginfo-1.4.8-1.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
pg_repack-debugsource-1.4.8-1.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
pgaudit-1.7.0-1.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
pgaudit-debuginfo-1.7.0-1.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
pgaudit-debugsource-1.7.0-1.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
postgres-decoderbufs-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
postgres-decoderbufs-debuginfo-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.ppc64le.rpm
postgresql-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-contrib-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-contrib-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-debugsource-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-docs-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-docs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-plperl-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-plperl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-plpython3-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-plpython3-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-pltcl-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-pltcl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-private-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-private-libs-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-private-libs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-server-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-server-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-server-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-server-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-static-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-test-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-test-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-upgrade-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-upgrade-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-upgrade-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm
postgresql-upgrade-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.ppc64le.rpm

s390x:
pg_repack-1.4.8-1.module+el8.8.0+17071+aaaceaa4.s390x.rpm
pg_repack-debuginfo-1.4.8-1.module+el8.8.0+17071+aaaceaa4.s390x.rpm
pg_repack-debugsource-1.4.8-1.module+el8.8.0+17071+aaaceaa4.s390x.rpm
pgaudit-1.7.0-1.module+el8.8.0+17071+aaaceaa4.s390x.rpm
pgaudit-debuginfo-1.7.0-1.module+el8.8.0+17071+aaaceaa4.s390x.rpm
pgaudit-debugsource-1.7.0-1.module+el8.8.0+17071+aaaceaa4.s390x.rpm
postgres-decoderbufs-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.s390x.rpm
postgres-decoderbufs-debuginfo-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.s390x.rpm
postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.s390x.rpm
postgresql-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-contrib-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-contrib-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-debugsource-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-docs-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-docs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-plperl-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-plperl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-plpython3-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-plpython3-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-pltcl-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-pltcl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-private-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-private-libs-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-private-libs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-server-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-server-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-server-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-server-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-static-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-test-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-test-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-upgrade-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-upgrade-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-upgrade-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm
postgresql-upgrade-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.s390x.rpm

x86_64:
pg_repack-1.4.8-1.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
pg_repack-debuginfo-1.4.8-1.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
pg_repack-debugsource-1.4.8-1.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
pgaudit-1.7.0-1.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
pgaudit-debuginfo-1.7.0-1.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
pgaudit-debugsource-1.7.0-1.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
postgres-decoderbufs-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
postgres-decoderbufs-debuginfo-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4.x86_64.rpm
postgresql-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-contrib-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-contrib-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-debugsource-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-docs-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-docs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-plperl-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-plperl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-plpython3-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-plpython3-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-pltcl-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-pltcl-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-private-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-private-libs-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-private-libs-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-server-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-server-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-server-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-server-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-static-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-test-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-test-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-upgrade-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-upgrade-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-upgrade-devel-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm
postgresql-upgrade-devel-debuginfo-15.3-1.module+el8.8.0+19565+1b0ddae0.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2023-2454
https://access.redhat.com/security/cve/CVE-2023-2455
https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=c0jd
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Red Hat Security Advisory 2023-7695-03

Red Hat Security Advisory 2023-7695-03 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-7694-03

Red Hat Security Advisory 2023-7694-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-7666-03

Red Hat Security Advisory 2023-7666-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

CVE-2023-45085: Releases - HyperCloud Docs

An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.  In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.

Red Hat Security Advisory 2023-7580-01

Red Hat Security Advisory 2023-7580-01 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-7545-01

Red Hat Security Advisory 2023-7545-01 - An update for postgresql is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-4539-01

Red Hat Security Advisory 2023-4539-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4539-01

Red Hat Security Advisory 2023-4539-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4535-01

Red Hat Security Advisory 2023-4535-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4535-01

Red Hat Security Advisory 2023-4535-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4527-01

Red Hat Security Advisory 2023-4527-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4527-01

Red Hat Security Advisory 2023-4527-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4313-01

Red Hat Security Advisory 2023-4313-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4313-01

Red Hat Security Advisory 2023-4313-01 - PostgreSQL is an advanced object-relational database management system.

RHSA-2023:4313: Red Hat Security Advisory: rh-postgresql12-postgresql security update

An update for rh-postgresql12-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2454: A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code. * CVE-2023-2455: A flaw was found in PostgreSQL, which could permit incorrect policies being applied in certain cases where role-specific policies are used and a given query is plan...

RHSA-2023:4313: Red Hat Security Advisory: rh-postgresql12-postgresql security update

An update for rh-postgresql12-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2454: A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code. * CVE-2023-2455: A flaw was found in PostgreSQL, which could permit incorrect policies being applied in certain cases where role-specific policies are used and a given query is plan...

Ubuntu Security Notice USN-6230-1

Ubuntu Security Notice 6230-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor.

Red Hat Security Advisory 2023-3714-01

Red Hat Security Advisory 2023-3714-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-3714-01

Red Hat Security Advisory 2023-3714-01 - PostgreSQL is an advanced object-relational database management system.

CVE-2023-2455: cve-details

Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.

CVE-2023-2454: cve-details

schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.

Ubuntu Security Notice USN-6104-1

Ubuntu Security Notice 6104-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor. Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row security policies. An authenticated user could possibly use this issue to complete otherwise forbidden reads and modifications.

Ubuntu Security Notice USN-6104-1

Ubuntu Security Notice 6104-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor. Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row security policies. An authenticated user could possibly use this issue to complete otherwise forbidden reads and modifications.

Debian Security Advisory 5401-1

Debian Linux Security Advisory 5401-1 - Two security issues were found in PostgreSQL, which may result in privilege escalation or incorrect policy enforcement.

Debian Security Advisory 5401-1

Debian Linux Security Advisory 5401-1 - Two security issues were found in PostgreSQL, which may result in privilege escalation or incorrect policy enforcement.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution