Описание
Security update for postgresql14
This update for postgresql14 fixes the following issues:
Security issues fixed:
- CVE-2023-5868: Fix handling of unknown-type arguments in DISTINCT 'any' aggregate functions. This error led to a text-type value being interpreted as an unknown-type value (that is, a zero-terminated string) at runtime. This could result in disclosure of server memory following the text value. (bsc#1216962)
- CVE-2023-5869: Detect integer overflow while computing new array dimensions. When assigning new elements to array subscripts that are outside the current array bounds, an undetected integer overflow could occur in edge cases. Memory stomps that are potentially exploitable for arbitrary code execution are possible, and so is disclosure of server memory. (bsc#1216961)
- CVE-2023-5870: Prevent the pg_signal_backend role from signalling background workers and autovacuum processes. The documentation says that pg_signal_backend cannot issue signals to superuser-owned processes. It was able to signal these background processes, though, because they advertise a role OID of zero. Treat that as indicating superuser ownership. The security implications of cancelling one of these process types are fairly small so far as the core code goes (we'll just start another one), but extensions might add background workers that are more vulnerable. Also ensure that the is_superuser parameter is set correctly in such processes. No specific security consequences are known for that oversight, but it might be significant for some extensions. (bsc#1216960)
- updated to 14.10 https://www.postgresql.org/docs/14/release-14-10.html
- Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
Список пакетов
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Software Development Kit 12 SP5
Ссылки
- Link for SUSE-SU-2023:4418-1
- E-Mail link for SUSE-SU-2023:4418-1
- SUSE Security Ratings
- SUSE Bug 1216022
- SUSE Bug 1216734
- SUSE Bug 1216960
- SUSE Bug 1216961
- SUSE Bug 1216962
- SUSE CVE CVE-2023-5868 page
- SUSE CVE CVE-2023-5869 page
- SUSE CVE CVE-2023-5870 page
Описание
A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.
Затронутые продукты
Ссылки
- CVE-2023-5868
- SUSE Bug 1216962
Описание
A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
Затронутые продукты
Ссылки
- CVE-2023-5869
- SUSE Bug 1216961
Описание
A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
Затронутые продукты
Ссылки
- CVE-2023-5870
- SUSE Bug 1216960