SUSE update for postgresql15



Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-39417
CVE-2023-39418
CWE-ID CWE-89
CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
SUSE Linux Enterprise Software Development Kit 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 12
Operating systems & Components / Operating system

libpq5-32bit
Operating systems & Components / Operating system package or component

libecpg6-32bit
Operating systems & Components / Operating system package or component

libecpg6-debuginfo-32bit
Operating systems & Components / Operating system package or component

libpq5-debuginfo-32bit
Operating systems & Components / Operating system package or component

postgresql15-docs
Operating systems & Components / Operating system package or component

postgresql15-debuginfo
Operating systems & Components / Operating system package or component

libecpg6
Operating systems & Components / Operating system package or component

postgresql15-plpython-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-server-debuginfo
Operating systems & Components / Operating system package or component

libpq5-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-plpython
Operating systems & Components / Operating system package or component

postgresql15-plperl-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-contrib-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-server
Operating systems & Components / Operating system package or component

postgresql15-pltcl-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-plperl
Operating systems & Components / Operating system package or component

postgresql15
Operating systems & Components / Operating system package or component

postgresql15-pltcl
Operating systems & Components / Operating system package or component

postgresql15-contrib
Operating systems & Components / Operating system package or component

libecpg6-debuginfo
Operating systems & Components / Operating system package or component

libpq5
Operating systems & Components / Operating system package or component

postgresql15-debugsource
Operating systems & Components / Operating system package or component

postgresql15-devel
Operating systems & Components / Operating system package or component

postgresql15-devel-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-server-devel-debuginfo
Operating systems & Components / Operating system package or component

postgresql15-server-devel
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) SQL injection

EUVDB-ID: #VU79454

Risk: Medium

CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-39417

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data within the extension script @substitutions@, which uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Mitigation

Update the affected package postgresql15 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Software Development Kit 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

libpq5-32bit: before 15.4-3.12.1

libecpg6-32bit: before 15.4-3.12.1

libecpg6-debuginfo-32bit: before 15.4-3.12.1

libpq5-debuginfo-32bit: before 15.4-3.12.1

postgresql15-docs: before 15.4-3.12.1

postgresql15-debuginfo: before 15.4-3.12.1

libecpg6: before 15.4-3.12.1

postgresql15-plpython-debuginfo: before 15.4-3.12.1

postgresql15-server-debuginfo: before 15.4-3.12.1

libpq5-debuginfo: before 15.4-3.12.1

postgresql15-plpython: before 15.4-3.12.1

postgresql15-plperl-debuginfo: before 15.4-3.12.1

postgresql15-contrib-debuginfo: before 15.4-3.12.1

postgresql15-server: before 15.4-3.12.1

postgresql15-pltcl-debuginfo: before 15.4-3.12.1

postgresql15-plperl: before 15.4-3.12.1

postgresql15: before 15.4-3.12.1

postgresql15-pltcl: before 15.4-3.12.1

postgresql15-contrib: before 15.4-3.12.1

libecpg6-debuginfo: before 15.4-3.12.1

libpq5: before 15.4-3.12.1

postgresql15-debugsource: before 15.4-3.12.1

postgresql15-devel: before 15.4-3.12.1

postgresql15-devel-debuginfo: before 15.4-3.12.1

postgresql15-server-devel-debuginfo: before 15.4-3.12.1

postgresql15-server-devel: before 15.4-3.12.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233342-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU79455

Risk: Low

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-39418

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges within the application.

The vulnerability exists due to the MERGE command does not properly enforce UPDATE or SELECT row security policies. A remote user can read or update protected data.

Mitigation

Update the affected package postgresql15 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Software Development Kit 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

libpq5-32bit: before 15.4-3.12.1

libecpg6-32bit: before 15.4-3.12.1

libecpg6-debuginfo-32bit: before 15.4-3.12.1

libpq5-debuginfo-32bit: before 15.4-3.12.1

postgresql15-docs: before 15.4-3.12.1

postgresql15-debuginfo: before 15.4-3.12.1

libecpg6: before 15.4-3.12.1

postgresql15-plpython-debuginfo: before 15.4-3.12.1

postgresql15-server-debuginfo: before 15.4-3.12.1

libpq5-debuginfo: before 15.4-3.12.1

postgresql15-plpython: before 15.4-3.12.1

postgresql15-plperl-debuginfo: before 15.4-3.12.1

postgresql15-contrib-debuginfo: before 15.4-3.12.1

postgresql15-server: before 15.4-3.12.1

postgresql15-pltcl-debuginfo: before 15.4-3.12.1

postgresql15-plperl: before 15.4-3.12.1

postgresql15: before 15.4-3.12.1

postgresql15-pltcl: before 15.4-3.12.1

postgresql15-contrib: before 15.4-3.12.1

libecpg6-debuginfo: before 15.4-3.12.1

libpq5: before 15.4-3.12.1

postgresql15-debugsource: before 15.4-3.12.1

postgresql15-devel: before 15.4-3.12.1

postgresql15-devel-debuginfo: before 15.4-3.12.1

postgresql15-server-devel-debuginfo: before 15.4-3.12.1

postgresql15-server-devel: before 15.4-3.12.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20233342-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###