PostgreSQL — свободная объектно-реляционная система управления базами данных.
Релизный цикл, информация об уязвимостях
График релизов
Количество 970

RLSA-2022:4807
Important: postgresql:12 security update

RLSA-2022:4805
Important: postgresql:10 security update

RLSA-2022:4771
Important: postgresql security update

SUSE-SU-2022:1874-1
Security update for postgresql14

SUSE-SU-2022:1869-1
Security update for postgresql12

SUSE-SU-2022:1835-1
Security update for postgresql13
GHSA-fr87-j862-8rwm
A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.
GHSA-f47v-jjrp-x56x
A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.
GHSA-8rj6-p58w-wpr2
A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
GHSA-q78v-pr3r-qpf7
A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
![]() | RLSA-2022:4807 Important: postgresql:12 security update | 3% Низкий | около 3 лет назад | |
![]() | RLSA-2022:4805 Important: postgresql:10 security update | 3% Низкий | около 3 лет назад | |
![]() | RLSA-2022:4771 Important: postgresql security update | 3% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1874-1 Security update for postgresql14 | 3% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1869-1 Security update for postgresql12 | 3% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1835-1 Security update for postgresql13 | 3% Низкий | около 3 лет назад | |
GHSA-fr87-j862-8rwm A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
GHSA-f47v-jjrp-x56x A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
GHSA-8rj6-p58w-wpr2 A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CVSS3: 8.8 | 0% Низкий | около 3 лет назад | |
GHSA-q78v-pr3r-qpf7 A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files. | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу