Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-5868 CVE-2023-5869 CVE-2023-5870 |
CWE-ID | CWE-200 CWE-190 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Software Development Kit 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system postgresql12-docs Operating systems & Components / Operating system package or component postgresql12 Operating systems & Components / Operating system package or component postgresql12-plperl-debuginfo Operating systems & Components / Operating system package or component postgresql12-plpython Operating systems & Components / Operating system package or component postgresql12-pltcl-debuginfo Operating systems & Components / Operating system package or component postgresql12-plpython-debuginfo Operating systems & Components / Operating system package or component postgresql12-pltcl Operating systems & Components / Operating system package or component postgresql12-server Operating systems & Components / Operating system package or component postgresql12-plperl Operating systems & Components / Operating system package or component postgresql12-contrib-debuginfo Operating systems & Components / Operating system package or component postgresql12-debuginfo Operating systems & Components / Operating system package or component postgresql12-server-debuginfo Operating systems & Components / Operating system package or component postgresql12-contrib Operating systems & Components / Operating system package or component postgresql12-server-devel Operating systems & Components / Operating system package or component postgresql12-server-devel-debuginfo Operating systems & Components / Operating system package or component postgresql12-devel-debuginfo Operating systems & Components / Operating system package or component postgresql12-devel Operating systems & Components / Operating system package or component postgresql12-debugsource Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU82941
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5868
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the aggregate function calls when handling "unknown"-type arguments. A remote user can read parts of system memory.
Update the affected package postgresql12 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
postgresql12-docs: before 12.17-3.49.1
postgresql12: before 12.17-3.49.1
postgresql12-plperl-debuginfo: before 12.17-3.49.1
postgresql12-plpython: before 12.17-3.49.1
postgresql12-pltcl-debuginfo: before 12.17-3.49.1
postgresql12-plpython-debuginfo: before 12.17-3.49.1
postgresql12-pltcl: before 12.17-3.49.1
postgresql12-server: before 12.17-3.49.1
postgresql12-plperl: before 12.17-3.49.1
postgresql12-contrib-debuginfo: before 12.17-3.49.1
postgresql12-debuginfo: before 12.17-3.49.1
postgresql12-server-debuginfo: before 12.17-3.49.1
postgresql12-contrib: before 12.17-3.49.1
postgresql12-server-devel: before 12.17-3.49.1
postgresql12-server-devel-debuginfo: before 12.17-3.49.1
postgresql12-devel-debuginfo: before 12.17-3.49.1
postgresql12-devel: before 12.17-3.49.1
postgresql12-debugsource: before 12.17-3.49.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234433-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82942
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-5869
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in array modification. A remote user can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected package postgresql12 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
postgresql12-docs: before 12.17-3.49.1
postgresql12: before 12.17-3.49.1
postgresql12-plperl-debuginfo: before 12.17-3.49.1
postgresql12-plpython: before 12.17-3.49.1
postgresql12-pltcl-debuginfo: before 12.17-3.49.1
postgresql12-plpython-debuginfo: before 12.17-3.49.1
postgresql12-pltcl: before 12.17-3.49.1
postgresql12-server: before 12.17-3.49.1
postgresql12-plperl: before 12.17-3.49.1
postgresql12-contrib-debuginfo: before 12.17-3.49.1
postgresql12-debuginfo: before 12.17-3.49.1
postgresql12-server-debuginfo: before 12.17-3.49.1
postgresql12-contrib: before 12.17-3.49.1
postgresql12-server-devel: before 12.17-3.49.1
postgresql12-server-devel-debuginfo: before 12.17-3.49.1
postgresql12-devel-debuginfo: before 12.17-3.49.1
postgresql12-devel: before 12.17-3.49.1
postgresql12-debugsource: before 12.17-3.49.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234433-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82943
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5870
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to pg_cancel_backend rolse signals background workers, including the logical replication launcher, autovacuum workers and the autovacuum launcher. A remote privileged user can abuse this behavior and perform a denial of service (DoS) attack.
Update the affected package postgresql12 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
postgresql12-docs: before 12.17-3.49.1
postgresql12: before 12.17-3.49.1
postgresql12-plperl-debuginfo: before 12.17-3.49.1
postgresql12-plpython: before 12.17-3.49.1
postgresql12-pltcl-debuginfo: before 12.17-3.49.1
postgresql12-plpython-debuginfo: before 12.17-3.49.1
postgresql12-pltcl: before 12.17-3.49.1
postgresql12-server: before 12.17-3.49.1
postgresql12-plperl: before 12.17-3.49.1
postgresql12-contrib-debuginfo: before 12.17-3.49.1
postgresql12-debuginfo: before 12.17-3.49.1
postgresql12-server-debuginfo: before 12.17-3.49.1
postgresql12-contrib: before 12.17-3.49.1
postgresql12-server-devel: before 12.17-3.49.1
postgresql12-server-devel-debuginfo: before 12.17-3.49.1
postgresql12-devel-debuginfo: before 12.17-3.49.1
postgresql12-devel: before 12.17-3.49.1
postgresql12-debugsource: before 12.17-3.49.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234433-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.