Lucene search

K
rosalinuxROSA LABROSA-SA-2024-2359
HistoryFeb 27, 2024 - 9:01 a.m.

Advisory ROSA-SA-2024-2359

2024-02-2709:01:10
ROSA LAB
abf.rosalinux.ru
19
postgresql 12.16
security vulnerabilities
remote attackers
arbitrary code execution
privilege elevation
security restrictions bypass
update required

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.1%

software: postgresql 12.16
WASP: ROSA-CHROME

package_evr_string: postgresql-12.16-1.src.rpm

CVE-ID: CVE-2023-2454
BDU-ID: 2023-03247
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the Schema Handler component of the PostgreSQL database management system is related to access delimitation flaws. Exploitation of the vulnerability could allow an attacker acting remotely to elevate their privileges and execute arbitrary code using the CREATE SCHEMA command
CVE-STATUS: Resolved
CVE-REV: To close, run the command: sudo dnf update postgresql

CVE-ID: CVE-2023-2455
BDU-ID: 2023-03024
CVE-Crit: MEDIUM
CVE-DESC.: A vulnerability in the Schema Handler component of the PostgreSQL database management system is related to errors in security settings. Exploitation of the vulnerability could allow an attacker acting remotely to bypass security restrictions
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update postgresql

CVE-ID: CVE-2023-39417
BDU-ID: 2023-04767
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the PostgreSQL database management system is related to the possibility of SQL injection in extensions that use quoting constructs (@extowner@, @extschema@, or @extschema:…@) inside parentheses (dollar quoting, ‘’, or “”). Exploitation of the vulnerability could allow an attacker acting remotely to execute an arbitrary SQL query against a database
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update postgresql

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchpostgresql< 12.16UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.1%