Headline
Red Hat Security Advisory 2023-4313-01
Red Hat Security Advisory 2023-4313-01 - PostgreSQL is an advanced object-relational database management system.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-postgresql12-postgresql security update
Advisory ID: RHSA-2023:4313-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4313
Issue date: 2023-07-27
CVE Names: CVE-2023-2454 CVE-2023-2455
=====================================================================
- Summary:
An update for rh-postgresql12-postgresql is now available for Red Hat
Software Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Software Collections for RHEL Workstation(v. 7) - ppc64le, s390x, x86_64
Red Hat Software Collections for RHEL(v. 7) - x86_64
- Description:
PostgreSQL is an advanced object-relational database management system
(DBMS).
Security Fix(es):
postgresql: schema_element defeats protective search_path changes
(CVE-2023-2454)postgresql: row security policies disregard user ID changes after
inlining. (CVE-2023-2455)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
If the postgresql service is running, it will be automatically restarted
after installing this update.
- Bugs fixed (https://bugzilla.redhat.com/):
2207568 - CVE-2023-2454 postgresql: schema_element defeats protective search_path changes
2207569 - CVE-2023-2455 postgresql: row security policies disregard user ID changes after inlining.
- Package List:
Red Hat Software Collections for RHEL Workstation(v. 7):
Source:
rh-postgresql12-postgresql-12.15-1.el7.src.rpm
ppc64le:
rh-postgresql12-postgresql-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-contrib-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-contrib-syspaths-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-debuginfo-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-devel-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-docs-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-libs-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-plperl-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-plpython-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-pltcl-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-server-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-server-syspaths-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-static-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-syspaths-12.15-1.el7.ppc64le.rpm
rh-postgresql12-postgresql-test-12.15-1.el7.ppc64le.rpm
s390x:
rh-postgresql12-postgresql-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-contrib-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-contrib-syspaths-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-debuginfo-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-devel-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-docs-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-libs-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-plperl-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-plpython-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-pltcl-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-server-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-server-syspaths-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-static-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-syspaths-12.15-1.el7.s390x.rpm
rh-postgresql12-postgresql-test-12.15-1.el7.s390x.rpm
x86_64:
rh-postgresql12-postgresql-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-contrib-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-contrib-syspaths-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-debuginfo-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-devel-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-docs-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-libs-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-plperl-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-plpython-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-pltcl-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-server-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-server-syspaths-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-static-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-syspaths-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-test-12.15-1.el7.x86_64.rpm
Red Hat Software Collections for RHEL(v. 7):
Source:
rh-postgresql12-postgresql-12.15-1.el7.src.rpm
x86_64:
rh-postgresql12-postgresql-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-contrib-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-contrib-syspaths-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-debuginfo-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-devel-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-docs-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-libs-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-plperl-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-plpython-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-pltcl-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-server-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-server-syspaths-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-static-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-syspaths-12.15-1.el7.x86_64.rpm
rh-postgresql12-postgresql-test-12.15-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2023-2454
https://access.redhat.com/security/cve/CVE-2023-2455
https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=NiAD
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Red Hat Security Advisory 2023-7695-03 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-7694-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-7667-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Issues addressed include integer overflow and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-7666-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.
An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process. In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.
Red Hat Security Advisory 2023-7580-01 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-7545-01 - An update for postgresql is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Issues addressed include integer overflow and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-5269-01 - PostgreSQL is an advanced object-relational database management system.
Red Hat Security Advisory 2023-4539-01 - PostgreSQL is an advanced object-relational database management system.
Red Hat Security Advisory 2023-4535-01 - PostgreSQL is an advanced object-relational database management system.
Red Hat Security Advisory 2023-4527-01 - PostgreSQL is an advanced object-relational database management system.
An update for rh-postgresql12-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2454: A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code. * CVE-2023-2455: A flaw was found in PostgreSQL, which could permit incorrect policies being applied in certain cases where role-specific policies are used and a given query is plan...
An update for rh-postgresql12-postgresql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2454: A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code. * CVE-2023-2455: A flaw was found in PostgreSQL, which could permit incorrect policies being applied in certain cases where role-specific policies are used and a given query is plan...
Ubuntu Security Notice 6230-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor.
Red Hat Security Advisory 2023-3714-01 - PostgreSQL is an advanced object-relational database management system.
Red Hat Security Advisory 2023-3714-01 - PostgreSQL is an advanced object-relational database management system.
Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.
schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.
Ubuntu Security Notice 6104-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor. Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row security policies. An authenticated user could possibly use this issue to complete otherwise forbidden reads and modifications.
Ubuntu Security Notice 6104-1 - Alexander Lakhin discovered that PostgreSQL incorrectly handled certain CREATE privileges. An authenticated user could possibly use this issue to execute arbitrary code as the bootstrap supervisor. Wolfgang Walther discovered that PostgreSQL incorrectly handled certain row security policies. An authenticated user could possibly use this issue to complete otherwise forbidden reads and modifications.
Debian Linux Security Advisory 5401-1 - Two security issues were found in PostgreSQL, which may result in privilege escalation or incorrect policy enforcement.
Debian Linux Security Advisory 5401-1 - Two security issues were found in PostgreSQL, which may result in privilege escalation or incorrect policy enforcement.