Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 14 |
CVE-ID | CVE-2021-3677 CVE-2023-39417 CVE-2023-5868 CVE-2023-5869 CVE-2023-5870 CVE-2024-0985 CVE-2024-10976 CVE-2024-10977 CVE-2024-10978 CVE-2024-10979 CVE-2024-7348 CVE-2025-1094 CVE-2023-2455 CVE-2016-2193 |
CWE-ID | CWE-401 CWE-89 CWE-200 CWE-190 CWE-264 CWE-269 CWE-300 CWE-266 CWE-285 CWE-367 CWE-20 CWE-254 |
Exploitation vector | Network |
Public exploit | Vulnerability #12 is being exploited in the wild. |
Vulnerable software |
openEuler Operating systems & Components / Operating system postgresql-13-test-rpm-macros Operating systems & Components / Operating system package or component postgresql-13-test Operating systems & Components / Operating system package or component postgresql-13-static Operating systems & Components / Operating system package or component postgresql-13-server-devel Operating systems & Components / Operating system package or component postgresql-13-server Operating systems & Components / Operating system package or component postgresql-13-private-libs Operating systems & Components / Operating system package or component postgresql-13-private-devel Operating systems & Components / Operating system package or component postgresql-13-pltcl Operating systems & Components / Operating system package or component postgresql-13-plpython3 Operating systems & Components / Operating system package or component postgresql-13-plperl Operating systems & Components / Operating system package or component postgresql-13-llvmjit Operating systems & Components / Operating system package or component postgresql-13-docs Operating systems & Components / Operating system package or component postgresql-13-debugsource Operating systems & Components / Operating system package or component postgresql-13-debuginfo Operating systems & Components / Operating system package or component postgresql-13-contrib Operating systems & Components / Operating system package or component postgresql-13 Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 14 vulnerabilities.
EUVDB-ID: #VU59043
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3677
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform DoS attack or gain access to sensitive information.
The vulnerability exists due memory leak during parallel sort operations. A remote user can force the application to leak memory and perform denial of service attack or read arbitrary memory parts on the system.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79454
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39417
CWE-ID:
CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within the extension script @substitutions@, which uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82941
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5868
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the aggregate function calls when handling "unknown"-type arguments. A remote user can read parts of system memory.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82942
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-5869
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in array modification. A remote user can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82943
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5870
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to pg_cancel_backend rolse signals background workers, including the logical replication launcher, autovacuum workers and the autovacuum launcher. A remote privileged user can abuse this behavior and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86275
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-0985
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the database.
The vulnerability exists due to late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY. A remote user who is an object creator can execute arbitrary SQL functions as the command issuer.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100511
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-10976
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to improper privilege management in cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. A remote user can bypass implemented security restrictions and gain unauthorized access to the database in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100512
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-10977
CWE-ID:
CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to spoof error messages from the database.
The vulnerability exists due to an error in libpq, which allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. A remote attacker can perform a man-in-the-middle attack to send a long error message that a human or screen-scraper user of psql mistakes for valid query results.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100513
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-10978
CWE-ID:
CWE-266 - Incorrect Privilege Assignment
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the application.
The vulnerability exists due to incorrect privilege assignment when application uses SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. A remote user can force the application to reset their role to a wrong user ID and view or change different rows from those intended.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100514
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-10979
CWE-ID:
CWE-285 - Improper Authorization
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to incorrect control of environment variables. A remote unprivileged database user can change sensitive process environment variables (e.g. PATH) and execute arbitrary code on the database server.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95605
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-7348
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges within the database.
The vulnerability exists due to a race condition when executing concurrent pg_dump sessions. A remote user with privileges to create and drop non-temporary objects can execute arbitrary SQL commands with the privileges of the role running pg_dump (which is often a superuser).
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103970
Risk: Critical
CVSSv4.0: 9.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]
CVE-ID: CVE-2025-1094
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary SQL queries in the database.
The vulnerability exists due to insufficient validation of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() and within the command line utility programs when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. A remote attacker can pass specially crafted input to the application and execute arbitrary SQL queries in the database.
Note, the vulnerability is being actively exploited in the wild.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU76042
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-2455
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass implemented security restrictions.
The vulnerability exists due to incomplete fix for #VU40402 (CVE-2016-2193) that did not anticipate a scenario involving function inlining. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications.
This affects only databases that have used CREATE POLICY to define a row security policy.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU40402
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2016-2193
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
PostgreSQL before 9.5.x before 9.5.2 does not properly maintain row-security status in cached plans, which might allow attackers to bypass intended access restrictions by leveraging a session that performs queries as more than one role.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP4
postgresql-13-test-rpm-macros: before 13.20-1
postgresql-13-test: before 13.20-1
postgresql-13-static: before 13.20-1
postgresql-13-server-devel: before 13.20-1
postgresql-13-server: before 13.20-1
postgresql-13-private-libs: before 13.20-1
postgresql-13-private-devel: before 13.20-1
postgresql-13-pltcl: before 13.20-1
postgresql-13-plpython3: before 13.20-1
postgresql-13-plperl: before 13.20-1
postgresql-13-llvmjit: before 13.20-1
postgresql-13-docs: before 13.20-1
postgresql-13-debugsource: before 13.20-1
postgresql-13-debuginfo: before 13.20-1
postgresql-13-contrib: before 13.20-1
postgresql-13: before 13.20-1
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1335
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.