DSA-5554-1

Source
https://security-tracker.debian.org/tracker/DSA-5554-1
Import Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-5554-1.json
Related
Published
2023-11-13T00:00:00Z
Modified
2023-11-14T11:17:55.012350Z
Details

Several vulnerabilities have been discovered in the PostgreSQL database system.

  • CVE-2023-5868 Jingzhou Fu discovered a memory disclosure flaw in aggregate function calls.
  • CVE-2023-5869 Pedro Gallegos reported integer overflow flaws resulting in buffer overflows in the array modification functions.
  • CVE-2023-5870 Hemanth Sandrana and Mahendrakar Srinivasarao reported that the pg_cancel_backend role can signal certain superuser processes, potentially resulting in denial of service.
  • CVE-2023-39417 Micah Gate, Valerie Woolard, Tim Carey-Smith, and Christoph Berg reported that an extension script using @substitutions@ within quoting may allow to perform an SQL injection for an attacker having database-level CREATE privileges.

For the oldstable distribution (bullseye), these problems have been fixed in version 13.13-0+deb11u1.

We recommend that you upgrade your postgresql-13 packages.

For the detailed security status of postgresql-13 please refer to its security tracker page at: \ https://security-tracker.debian.org/tracker/postgresql-13

References

Affected packages

Debian:11 / postgresql-13

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
13.13-0+deb11u1

Affected versions

13.*

13.3-1
13.4-0+deb11u1
13.4-1
13.4-2
13.4-3
13.5-0+deb11u1
13.7-0+deb11u1
13.8-0+deb11u1
13.9-0+deb11u1
13.10-0+deb11u1
13.11-0+deb11u1
13.12-0+deb11u1