Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-4539-01

Red Hat Security Advisory 2023-4539-01 - PostgreSQL is an advanced object-relational database management system.

Packet Storm
#sql#vulnerability#mac#linux#red_hat#js#perl#postgres

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: postgresql:10 security update
Advisory ID: RHSA-2023:4539-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4539
Issue date: 2023-08-08
CVE Names: CVE-2023-2454 CVE-2023-2455
=====================================================================

  1. Summary:

An update for the postgresql:10 module is now available for Red Hat
Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

  1. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

Security Fix(es):

  • postgresql: schema_element defeats protective search_path changes
    (CVE-2023-2454)

  • postgresql: row security policies disregard user ID changes after
    inlining. (CVE-2023-2455)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

  1. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2207568 - CVE-2023-2454 postgresql: schema_element defeats protective search_path changes
2207569 - CVE-2023-2455 postgresql: row security policies disregard user ID changes after inlining.

  1. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
postgresql-10.23-2.module+el8.8.0+19493+5804baf6.src.rpm

aarch64:
postgresql-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-contrib-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-contrib-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-debugsource-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-docs-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-docs-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-plperl-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-plperl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-plpython3-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-plpython3-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-pltcl-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-pltcl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-server-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-server-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-server-devel-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-server-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-static-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-test-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-test-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-test-rpm-macros-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-upgrade-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-upgrade-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-upgrade-devel-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm
postgresql-upgrade-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.aarch64.rpm

ppc64le:
postgresql-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-contrib-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-contrib-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-debugsource-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-docs-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-docs-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-plperl-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-plperl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-plpython3-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-plpython3-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-pltcl-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-pltcl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-server-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-server-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-server-devel-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-server-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-static-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-test-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-test-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-test-rpm-macros-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-upgrade-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-upgrade-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-upgrade-devel-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm
postgresql-upgrade-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.ppc64le.rpm

s390x:
postgresql-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-contrib-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-contrib-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-debugsource-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-docs-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-docs-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-plperl-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-plperl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-plpython3-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-plpython3-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-pltcl-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-pltcl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-server-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-server-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-server-devel-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-server-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-static-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-test-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-test-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-test-rpm-macros-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-upgrade-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-upgrade-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-upgrade-devel-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm
postgresql-upgrade-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.s390x.rpm

x86_64:
postgresql-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-contrib-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-contrib-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-debugsource-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-docs-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-docs-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-plperl-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-plperl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-plpython3-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-plpython3-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-pltcl-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-pltcl-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-server-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-server-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-server-devel-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-server-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-static-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-test-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-test-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-test-rpm-macros-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-upgrade-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-upgrade-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-upgrade-devel-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm
postgresql-upgrade-devel-debuginfo-10.23-2.module+el8.8.0+19493+5804baf6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2023-2454
https://access.redhat.com/security/cve/CVE-2023-2455
https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Njbj
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Red Hat Security Advisory 2023-7695-03

Red Hat Security Advisory 2023-7695-03 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-7694-03

Red Hat Security Advisory 2023-7694-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-7666-03

Red Hat Security Advisory 2023-7666-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

CVE-2023-45085: Releases - HyperCloud Docs

An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.  In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.

Red Hat Security Advisory 2023-7580-01

Red Hat Security Advisory 2023-7580-01 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-7545-01

Red Hat Security Advisory 2023-7545-01 - An update for postgresql is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-5269-01

Red Hat Security Advisory 2023-5269-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4535-01

Red Hat Security Advisory 2023-4535-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4527-01

Red Hat Security Advisory 2023-4527-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4313-01

Red Hat Security Advisory 2023-4313-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-4313-01

Red Hat Security Advisory 2023-4313-01 - PostgreSQL is an advanced object-relational database management system.

RHSA-2023:4313: Red Hat Security Advisory: rh-postgresql12-postgresql security update

An update for rh-postgresql12-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2454: A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code. * CVE-2023-2455: A flaw was found in PostgreSQL, which could permit incorrect policies being applied in certain cases where role-specific policies are used and a given query is plan...

RHSA-2023:4313: Red Hat Security Advisory: rh-postgresql12-postgresql security update

An update for rh-postgresql12-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2454: A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code. * CVE-2023-2455: A flaw was found in PostgreSQL, which could permit incorrect policies being applied in certain cases where role-specific policies are used and a given query is plan...

Ubuntu Security Notice USN-6230-1

Ubuntu Security Notice 6230-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor.

Red Hat Security Advisory 2023-3714-01

Red Hat Security Advisory 2023-3714-01 - PostgreSQL is an advanced object-relational database management system.

Red Hat Security Advisory 2023-3714-01

Red Hat Security Advisory 2023-3714-01 - PostgreSQL is an advanced object-relational database management system.

CVE-2023-2455: cve-details

Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.

CVE-2023-2454: cve-details

schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.

Ubuntu Security Notice USN-6104-1

Ubuntu Security Notice 6104-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor. Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row security policies. An authenticated user could possibly use this issue to complete otherwise forbidden reads and modifications.

Ubuntu Security Notice USN-6104-1

Ubuntu Security Notice 6104-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor. Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row security policies. An authenticated user could possibly use this issue to complete otherwise forbidden reads and modifications.

Debian Security Advisory 5401-1

Debian Linux Security Advisory 5401-1 - Two security issues were found in PostgreSQL, which may result in privilege escalation or incorrect policy enforcement.

Debian Security Advisory 5401-1

Debian Linux Security Advisory 5401-1 - Two security issues were found in PostgreSQL, which may result in privilege escalation or incorrect policy enforcement.

Packet Storm: Latest News

Zeek 6.0.9