DSA-5553-1

Source
https://security-tracker.debian.org/tracker/DSA-5553-1
Import Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-5553-1.json
Related
Published
2023-11-13T00:00:00Z
Modified
2023-11-14T11:17:51.823723Z
Details

Several vulnerabilities have been discovered in the PostgreSQL database system.

  • CVE-2023-5868 Jingzhou Fu discovered a memory disclosure flaw in aggregate function calls.
  • CVE-2023-5869 Pedro Gallegos reported integer overflow flaws resulting in buffer overflows in the array modification functions.
  • CVE-2023-5870 Hemanth Sandrana and Mahendrakar Srinivasarao reported that the pg_cancel_backend role can signal certain superuser processes, potentially resulting in denial of service.
  • CVE-2023-39417 Micah Gate, Valerie Woolard, Tim Carey-Smith, and Christoph Berg reported that an extension script using @substitutions@ within quoting may allow to perform an SQL injection for an attacker having database-level CREATE privileges.
  • CVE-2023-39418 Dean Rasheed reported that the MERGE command fails to enforce UPDATE or SELECT row security policies.

For the stable distribution (bookworm), these problems have been fixed in version 15.5-0+deb12u1.

We recommend that you upgrade your postgresql-15 packages.

For the detailed security status of postgresql-15 please refer to its security tracker page at: \ https://security-tracker.debian.org/tracker/postgresql-15

References

Affected packages

Debian:12 / postgresql-15

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
15.5-0+deb12u1

Affected versions

15.*

15.3-0+deb12u1
15.3-1
15.4-0+deb12u1
15.4-1
15.4-2
15.4-3