First published: Mon May 02 2022(Updated: )
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/postgresql | <14.3 | 14.3 |
redhat/postgresql | <13.7 | 13.7 |
redhat/postgresql | <12.11 | 12.11 |
redhat/postgresql | <11.16 | 11.16 |
redhat/postgresql | <10.21 | 10.21 |
PostgreSQL PostgreSQL | >=10.0<10.21 | |
PostgreSQL PostgreSQL | >=11.0<11.16 | |
PostgreSQL PostgreSQL | >=12.0<12.11 | |
PostgreSQL PostgreSQL | >=13.0<13.7 | |
PostgreSQL PostgreSQL | >=14.0<14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1552 is a vulnerability found in PostgreSQL that allows a privileged user to maintain another user's objects without proper protections.
CVE-2022-1552 affects PostgreSQL versions 10.0 to 10.21, 11.0 to 11.16, 12.0 to 12.11, 13.0 to 13.7, and 14.0 to 14.3.
CVE-2022-1552 has a severity rating of 8.8 (high).
To fix CVE-2022-1552, it is recommended to update PostgreSQL to version 14.3, 13.7, 12.11, 11.16, or 10.21 depending on the installed version.
More information about CVE-2022-1552 can be found at the following references: [1] [2] [3].