Bug 2113825 (CVE-2022-2625)
Summary: | CVE-2022-2625 postgresql: Extension scripts replace objects not belonging to the extension. | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | adibrahi, anon.amish, caswilli, databases-maint, devrim, dffrench, fandrieu, fjansen, fjanus, gzaronik, hhorak, jburrell, jkoehler, jmlich83, jorton, jwong, kaycoth, kshier, mike, ngough, panovotn, pkubat, praiskup, psegedy, rcarrier, rgodfrey, security-response-team, tgl, tsasak |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | postgresql 14.5, postgresql 13.8, postgresql 12.12, postgresql 11.17, postgresql 10.22 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-02 01:33:19 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2114730, 2114731, 2114732, 2114733, 2114734, 2119248, 2119249, 2119250, 2119251, 2119252, 2119253, 2119254, 2131176, 2131177, 2143167, 2158190, 2158191, 2158194, 2173597, 2173598 | ||
Bug Blocks: | 2113826 |
Description
Sandipan Roy
2022-08-02 05:53:49 UTC
https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/ Created mingw-postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119248] Created postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119249] Created postgresql:10/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119250] Created postgresql:11/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119251] Created postgresql:12/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119252] Created postgresql:13/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119253] Created postgresql:14/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2119254] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7128 https://access.redhat.com/errata/RHSA-2022:7128 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2625 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0113 https://access.redhat.com/errata/RHSA-2023:0113 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:0160 https://access.redhat.com/errata/RHSA-2023:0160 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1576 https://access.redhat.com/errata/RHSA-2023:1576 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:1693 https://access.redhat.com/errata/RHSA-2023:1693 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:7545 https://access.redhat.com/errata/RHSA-2023:7545 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:7580 https://access.redhat.com/errata/RHSA-2023:7580 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2023:7667 https://access.redhat.com/errata/RHSA-2023:7667 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:7694 https://access.redhat.com/errata/RHSA-2023:7694 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2023:7695 https://access.redhat.com/errata/RHSA-2023:7695 |