postgresql is vulnerable to SQL injection. This vulnerability occurs when a user sends a specially crafted query that uses the @extowner@
function. If the query is valid, PostgreSQL could be tricked into executing arbitrary SQL code.
access.redhat.com/errata/RHSA-2023:7545
access.redhat.com/errata/RHSA-2023:7579
access.redhat.com/errata/RHSA-2023:7580
access.redhat.com/errata/RHSA-2023:7581
access.redhat.com/errata/RHSA-2023:7616
access.redhat.com/errata/RHSA-2023:7656
access.redhat.com/errata/RHSA-2023:7666
access.redhat.com/errata/RHSA-2023:7667
access.redhat.com/errata/RHSA-2023:7694
access.redhat.com/errata/RHSA-2023:7695
access.redhat.com/errata/RHSA-2023:7714
access.redhat.com/errata/RHSA-2023:7770
access.redhat.com/errata/RHSA-2023:7772
access.redhat.com/errata/RHSA-2023:7784
access.redhat.com/errata/RHSA-2023:7785
access.redhat.com/errata/RHSA-2023:7883
access.redhat.com/errata/RHSA-2023:7884
access.redhat.com/errata/RHSA-2023:7885
access.redhat.com/errata/RHSA-2024:0304
access.redhat.com/errata/RHSA-2024:0332
access.redhat.com/errata/RHSA-2024:0337
access.redhat.com/security/cve/CVE-2023-39417
bugzilla.redhat.com/show_bug.cgi?id=2228111
lists.debian.org/debian-lts-announce/2023/10/msg00003.html
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/community.yaml
secdb.alpinelinux.org/v3.15/main.yaml
secdb.alpinelinux.org/v3.16/community.yaml
secdb.alpinelinux.org/v3.16/main.yaml
secdb.alpinelinux.org/v3.17/community.yaml
secdb.alpinelinux.org/v3.17/main.yaml
secdb.alpinelinux.org/v3.18/community.yaml
secdb.alpinelinux.org/v3.18/main.yaml
security.netapp.com/advisory/ntap-20230915-0002/
www.debian.org/security/2023/dsa-5553
www.debian.org/security/2023/dsa-5554
www.postgresql.org/support/security/CVE-2023-39417