vulnerability
Amazon Linux 2023: CVE-2024-4317: Low priority package update for postgresql15
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:M/Au:S/C:P/I:N/A:N) | May 9, 2024 | Feb 17, 2025 | Jul 9, 2025 |
Severity
3
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:N)
Published
May 9, 2024
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
Missing authorization in PostgreSQL built-in views pg_stats_ext and pg_stats_ext_exprs allows an unprivileged database user to read most common values and other statistics from CREATE STATISTICS commands of other users. The most common values may reveal column values the eavesdropper could not otherwise read or results of functions they cannot execute. Installing an unaffected version only fixes fresh PostgreSQL installations, namely those that are created with the initdb utility after installing that version. Current PostgreSQL installations will remain vulnerable until they follow the instructions in the release notes. Within major versions 14-16, minor versions before PostgreSQL 16.3, 15.7, and 14.12 are affected. Versions before PostgreSQL 14 are unaffected.
A flaw was found in PostgreSQL. Missing authorization in the built-in views pg_stats_ext and pg_stats_ext_exprs allows an unprivileged database user to read most common values and other statistics from CREATE STATISTICS commands of other users. The most common values may reveal column values the eavesdropper could not otherwise read or results of functions they cannot execute.
A flaw was found in PostgreSQL. Missing authorization in the built-in views pg_stats_ext and pg_stats_ext_exprs allows an unprivileged database user to read most common values and other statistics from CREATE STATISTICS commands of other users. The most common values may reveal column values the eavesdropper could not otherwise read or results of functions they cannot execute.
Solutions
amazon-linux-2023-upgrade-postgresql15amazon-linux-2023-upgrade-postgresql15-contribamazon-linux-2023-upgrade-postgresql15-contrib-debuginfoamazon-linux-2023-upgrade-postgresql15-debuginfoamazon-linux-2023-upgrade-postgresql15-debugsourceamazon-linux-2023-upgrade-postgresql15-docsamazon-linux-2023-upgrade-postgresql15-docs-debuginfoamazon-linux-2023-upgrade-postgresql15-llvmjitamazon-linux-2023-upgrade-postgresql15-llvmjit-debuginfoamazon-linux-2023-upgrade-postgresql15-plperlamazon-linux-2023-upgrade-postgresql15-plperl-debuginfoamazon-linux-2023-upgrade-postgresql15-plpython3amazon-linux-2023-upgrade-postgresql15-plpython3-debuginfoamazon-linux-2023-upgrade-postgresql15-pltclamazon-linux-2023-upgrade-postgresql15-pltcl-debuginfoamazon-linux-2023-upgrade-postgresql15-private-develamazon-linux-2023-upgrade-postgresql15-private-libsamazon-linux-2023-upgrade-postgresql15-private-libs-debuginfoamazon-linux-2023-upgrade-postgresql15-serveramazon-linux-2023-upgrade-postgresql15-server-debuginfoamazon-linux-2023-upgrade-postgresql15-server-develamazon-linux-2023-upgrade-postgresql15-server-devel-debuginfoamazon-linux-2023-upgrade-postgresql15-staticamazon-linux-2023-upgrade-postgresql15-testamazon-linux-2023-upgrade-postgresql15-test-debuginfoamazon-linux-2023-upgrade-postgresql15-test-rpm-macrosamazon-linux-2023-upgrade-postgresql15-upgradeamazon-linux-2023-upgrade-postgresql15-upgrade-debuginfoamazon-linux-2023-upgrade-postgresql15-upgrade-develamazon-linux-2023-upgrade-postgresql15-upgrade-devel-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.