vulnerability
Amazon Linux AMI 2: CVE-2022-1552: Security patch for libpq, postgresql (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | 2022-08-31 | 2022-09-30 | 2025-01-30 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
2022-08-31
Added
2022-09-30
Modified
2025-01-30
Description
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
Solution(s)
amazon-linux-ami-2-upgrade-libpqamazon-linux-ami-2-upgrade-libpq-debuginfoamazon-linux-ami-2-upgrade-libpq-develamazon-linux-ami-2-upgrade-postgresqlamazon-linux-ami-2-upgrade-postgresql-contribamazon-linux-ami-2-upgrade-postgresql-debuginfoamazon-linux-ami-2-upgrade-postgresql-develamazon-linux-ami-2-upgrade-postgresql-docsamazon-linux-ami-2-upgrade-postgresql-libsamazon-linux-ami-2-upgrade-postgresql-llvmjitamazon-linux-ami-2-upgrade-postgresql-plperlamazon-linux-ami-2-upgrade-postgresql-plpythonamazon-linux-ami-2-upgrade-postgresql-plpython2amazon-linux-ami-2-upgrade-postgresql-plpython3amazon-linux-ami-2-upgrade-postgresql-pltclamazon-linux-ami-2-upgrade-postgresql-private-develamazon-linux-ami-2-upgrade-postgresql-private-libsamazon-linux-ami-2-upgrade-postgresql-serveramazon-linux-ami-2-upgrade-postgresql-server-develamazon-linux-ami-2-upgrade-postgresql-staticamazon-linux-ami-2-upgrade-postgresql-testamazon-linux-ami-2-upgrade-postgresql-test-rpm-macrosamazon-linux-ami-2-upgrade-postgresql-upgradeamazon-linux-ami-2-upgrade-postgresql-upgrade-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.