Alexander Lakhin discovered that PostgreSQL incorrectly handled the
security restricted operation sandbox when a privileged user is maintaining
another user’s objects. An attacker having permission to create non-temp
objects can use this issue to execute arbitrary commands as the superuser.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | postgresql-14 | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libecpg-compat3 | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libecpg-compat3-dbgsym | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libecpg-dev | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libecpg-dev-dbgsym | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libecpg6 | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libecpg6-dbgsym | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libpgtypes3 | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libpgtypes3-dbgsym | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libpq-dev | <Â 14.3-0ubuntu0.22.04.1 | UNKNOWN |