First published: Thu Nov 14 2024(Updated: )
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | <17.1<16.5<15.9<14.14<13.17<12.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2326253 is high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-2326253, upgrade to a version of PostgreSQL that is 17.1 or higher, or 16.5 or higher, or 15.9 or higher, or 14.14 or higher, or 13.17 or higher, or 12.21 or higher.
Versions of PostgreSQL prior to 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected by REDHAT-BUG-2326253.
REDHAT-BUG-2326253 can be exploited for arbitrary code execution by altering sensitive process environment variables.
An unprivileged database user can be affected by REDHAT-BUG-2326253, as it allows them to change sensitive environment variables.