First published: Tue Oct 31 2023(Updated: )
A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/PostgreSQL | <16.1 | 16.1 |
redhat/PostgreSQL | <15.5 | 15.5 |
redhat/PostgreSQL | <14.10 | 14.10 |
redhat/PostgreSQL | <13.13 | 13.13 |
redhat/PostgreSQL | <12.17 | 12.17 |
redhat/PostgreSQL | <11.22 | 11.22 |
debian/postgresql-13 | 13.16-0+deb11u1 | |
debian/postgresql-15 | 15.8-0+deb12u1 | |
debian/postgresql-16 | 16.4-1 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
IBM InfoSphere Guardium z/OS | <=11.4 | |
IBM InfoSphere Guardium z/OS | <=11.5 | |
IBM InfoSphere Guardium z/OS | <=12.0 | |
PostgreSQL Common | >=11.0<11.22 | |
PostgreSQL Common | >=12.0<12.17 | |
PostgreSQL Common | >=13.0<13.13 | |
PostgreSQL Common | >=14.0<14.10 | |
PostgreSQL Common | >=15.0<15.5 | |
PostgreSQL Common | =16.0 | |
Red Hat CodeReady Linux Builder | =9.2 | |
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | =9.0_ppc64le | |
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | =8.6_aarch64 | |
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | =9.0_aarch64 | |
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | =9.2_aarch64 | |
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | =9.0_s390x | |
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | =9.2_s390x | |
Red Hat CodeReady Linux Builder for Power, little endian | =9.0_ppc64le | |
Red Hat CodeReady Linux Builder for Power, little endian | =9.2_ppc64le | |
Red Hat Software Collections | =1.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server EUS | =8.8 | |
Red Hat Enterprise Linux Server EUS | =9.0 | |
Red Hat Enterprise Linux Server EUS | =9.2 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.8_aarch64 | |
Red Hat Enterprise Linux for IBM Z Systems | =7.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.6_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.8_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.2_s390x | |
Red Hat Enterprise Linux for Power, big endian | =7.0_ppc64 | |
Red Hat Enterprise Linux for Power, little endian | =7.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian | =8.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.6_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.8_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux for Scientific Computing | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Server | =9.2 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5869 is a vulnerability that allows for buffer overrun from integer overflow in array modification.
CVE-2023-5869 has a severity level of high (7).
The affected software versions include postgresql-11, postgresql-13, postgresql-15, postgresql-16, PostgreSQL, and postgresql-14.
To fix CVE-2023-5869, update your PostgreSQL package to the recommended remedy versions provided by the source (debian, redhat, or ubuntu).
You can find more information about CVE-2023-5869 at the following references: [link1], [link2], [link3].