vulnerability
CentOS Linux: CVE-2023-5869: Important: postgresql security update (CESA-2023:7783)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Nov 30, 2023 | Nov 30, 2023 | Jan 28, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Nov 30, 2023
Added
Nov 30, 2023
Modified
Jan 28, 2025
Description
A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
Solution(s)
centos-upgrade-postgresqlcentos-upgrade-postgresql-contribcentos-upgrade-postgresql-debuginfocentos-upgrade-postgresql-develcentos-upgrade-postgresql-docscentos-upgrade-postgresql-libscentos-upgrade-postgresql-plperlcentos-upgrade-postgresql-plpythoncentos-upgrade-postgresql-pltclcentos-upgrade-postgresql-servercentos-upgrade-postgresql-staticcentos-upgrade-postgresql-testcentos-upgrade-postgresql-upgrade
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.