Bug 2207568 (CVE-2023-2454)

Summary: CVE-2023-2454 postgresql: schema_element defeats protective search_path changes
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aazores, adudiak, adupliak, aileenc, alampare, alazarot, anstephe, asoldano, ataylor, avibelli, bbaranow, bbuckingham, bcourt, bgeorges, bmaxwell, boliveir, brian.stansberry, caswilli, cdewolf, chazlett, clement.escoffier, dandread, darran.lofthouse, databases-maint, dffrench, dhanak, dkreling, dosoudil, drehak, drichtar, eaguilar, ebaron, ehelms, emingora, eric.wittmann, fjansen, fjanus, fjuma, fmongiar, gjospin, gmalinko, gparvin, gsmet, gzaronik, hamadhan, hhorak, hkataria, ibek, ivassile, iweiss, janstey, jburrell, jkang, jmartisk, jnethert, jorton, jpallich, jpechane, jpoth, jrokos, jross, jsherril, kaycoth, kshier, kverlaen, kyoshida, lbacciot, lgao, lpetrovi, lthon, lzap, max.andersen, mhulan, mnovotny, mosmerov, msochure, msvehla, myarboro, nboldt, ngough, njean, nmoumoul, nwallace, nweather, orabin, owatkins, pahickey, pantinor, pcreech, pdelbell, pdrozd, peholase, pgallagh, pjindal, pkubat, pmackay, praiskup, probinso, psegedy, pskopek, rchan, rgodfrey, rguimara, rkieley, rowaters, rrajasek, rruss, rstancel, rsvoboda, saroy, sbiarozk, scorneli, sdouglas, sfroberg, smaestri, snavale, stcannon, sthorger, tcunning, teagle, tom.jenkinson, tqvarnst, yfang, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: PostgreSQL 15.3, PostgreSQL 14.8, PostgreSQL 13.11, PostgreSQL 12.15, PostgreSQL 11.20 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in PostgreSQL. Certain database calls could permit an attacker with elevated database-level privileges to execute arbitrary code.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2207575, 2207576, 2207577, 2207578, 2207579, 2207581, 2207583, 2207585, 2207931, 2207932, 2207933, 2207934, 2207935, 2207936, 2207937, 2207938, 2208306, 2212815, 2214583, 2214875, 2224309, 2228767, 2249521    
Bug Blocks: 2203202    

Description TEJ RATHI 2023-05-16 10:07:05 UTC
CVE-2023-2454: CREATE SCHEMA ... schema_element defeats protective search_path changes.

Versions Affected: 11 - 15. This problem is quite old.

This enabled an attacker having database-level CREATE privilege to execute arbitrary code as the bootstrap superuser. Database owners have that right by default, and explicit grants may extend it to other users.

https://www.postgresql.org/support/security/CVE-2023-2454/

Comment 1 TEJ RATHI 2023-05-16 10:17:25 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207576]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207575]


Created postgresql:10/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207577]


Created postgresql:11/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207578]


Created postgresql:12/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207579]


Created postgresql:13/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207581]


Created postgresql:14/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207583]


Created postgresql:15/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2207585]

Comment 9 errata-xmlrpc 2023-06-21 14:38:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:3714 https://access.redhat.com/errata/RHSA-2023:3714

Comment 14 errata-xmlrpc 2023-07-27 13:32:41 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2023:4313 https://access.redhat.com/errata/RHSA-2023:4313

Comment 15 errata-xmlrpc 2023-07-31 09:19:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4327 https://access.redhat.com/errata/RHSA-2023:4327

Comment 16 errata-xmlrpc 2023-08-08 08:37:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4527 https://access.redhat.com/errata/RHSA-2023:4527

Comment 17 errata-xmlrpc 2023-08-08 08:37:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4535 https://access.redhat.com/errata/RHSA-2023:4535

Comment 18 errata-xmlrpc 2023-08-08 08:38:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4539 https://access.redhat.com/errata/RHSA-2023:4539

Comment 19 errata-xmlrpc 2023-09-19 14:34:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5269 https://access.redhat.com/errata/RHSA-2023:5269

Comment 25 errata-xmlrpc 2023-11-28 15:08:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:7545 https://access.redhat.com/errata/RHSA-2023:7545

Comment 26 errata-xmlrpc 2023-11-29 14:10:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:7580 https://access.redhat.com/errata/RHSA-2023:7580

Comment 30 errata-xmlrpc 2023-12-06 09:47:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:7667 https://access.redhat.com/errata/RHSA-2023:7667

Comment 31 errata-xmlrpc 2023-12-06 09:48:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:7666 https://access.redhat.com/errata/RHSA-2023:7666

Comment 32 errata-xmlrpc 2023-12-07 08:20:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:7694 https://access.redhat.com/errata/RHSA-2023:7694

Comment 33 errata-xmlrpc 2023-12-07 08:20:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:7695 https://access.redhat.com/errata/RHSA-2023:7695

Comment 34 errata-xmlrpc 2023-12-13 08:02:40 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2023:7772 https://access.redhat.com/errata/RHSA-2023:7772