• 公告ID (KylinSec-SA-2023-2244)

摘要:

libpq security update

安全等级: High

公告ID: KylinSec-SA-2023-2244

发布日期: 2023年9月2日

关联CVE: CVE-2020-21469   CVE-2023-2454   CVE-2023-39418   CVE-2023-2455   CVE-2023-39417  

  • 详细介绍

1. 漏洞描述

   

PostgreSQL is a powerful, open source object-relational database system that uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads. This package provides the essential shared library for any PostgreSQL client program or interface.



Security Fix(es):

** DISPUTED ** An issue was discovered in PostgreSQL 12.2 allows attackers to cause a denial of service via repeatedly sending SIGHUP signals. NOTE: this is disputed by the vendor because untrusted users cannot send SIGHUP signals; they can only be sent by a PostgreSQL superuser, a user with pg_reload_conf access, or a user with sufficient privileges at the OS level (the postgres account or the root account).(CVE-2020-21469)

schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.(CVE-2023-2454)

Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.(CVE-2023-2455)

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.(CVE-2023-39417)

A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows.(CVE-2023-39418)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2020-21469 KY3.5.2 libpq Fixed
CVE-2023-2454 KY3.5.2 libpq Fixed
CVE-2023-39418 KY3.5.2 libpq Fixed
CVE-2023-2455 KY3.5.2 libpq Fixed
CVE-2023-39417 KY3.5.2 libpq Fixed

3. 影响组件

    libpq

4. 修复版本

   

KY3.5.2

软件名称 架构 版本号
libpq x86_64 13.12-1.ky3_5
libpq-devel x86_64 13.12-1.ky3_5
libpq aarch64 13.12-1.ky3_5
libpq-devel aarch64 13.12-1.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.2:

x86_64:

     libpq   

     libpq-devel   

aarch64:

     libpq   

     libpq-devel   

上一篇:KylinSec-SA-2023-2243 下一篇:KylinSec-SA-2023-2245